WO2002050695A1 - Spontaneous virtual private network between portable device and enterprise network - Google Patents
Spontaneous virtual private network between portable device and enterprise network Download PDFInfo
- Publication number
- WO2002050695A1 WO2002050695A1 PCT/US2001/048993 US0148993W WO0250695A1 WO 2002050695 A1 WO2002050695 A1 WO 2002050695A1 US 0148993 W US0148993 W US 0148993W WO 0250695 A1 WO0250695 A1 WO 0250695A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- data
- network
- remote
- user
- enteφrise
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0272—Virtual private networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/46—Interconnection of networks
- H04L12/4641—Virtual LANs, VLANs, e.g. virtual private networks [VPN]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
- H04W76/12—Setup of transport tunnels
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/166—Implementing security features at a particular protocol layer at the transport layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organising networks, e.g. ad-hoc networks or sensor networks
Definitions
- the present invention relates to methods and systems for enabling a user to access data over a virtual private network. More particularly, the present invention relates to methods and systems for providing a user with controlled mobile remote access to network data over a spontaneous virtual private network.
- firewalls are configured to prevent unidentified users from accessing network data from a remote location.
- firewalls are generally very beneficial for enabling a business to have more control over who accesses its network data, they also have the undesirable consequence of disconnecting mobile professionals from critical and urgent business information when they are away from the office or otherwise unable to gain local access to the network data.
- VPNs virtual private networks
- Some businesses have installed virtual private networks (VPNs) between the business and designated remote locations, such as from a professional's home or satellite office.
- the function of a VPN is to open a secure connection between the business network and a designated remote location through the business firewall.
- FIG. 1 An embodiment of a prior art system and method for enabling remote access to network data over a VPN is shown in Figure 1.
- a user 10 communicates with the business network 12 from a remote location through a VPN tunnel 14.
- a VPN node 16 At each end of the VPN tunnel 14 is a VPN node 16, 18.
- the NPN node 16 straddles the business network's firewall 20.
- Network data 22 is transmitted through the firewall 20 at the VPN node 16 and through the VPN tunnel 14 to the user 10.
- a remote business 23 it is also possible for a remote business 23 to communicate with the business network 12 through a VPN tunnel 24, as shown between VPN node 16 and VPN node 26.
- VPN hardware and software employ encryption technology and other security features at the VPN nodes to ensure that data transmitted through a VPN tunnel is not intercepted and that the user or remote busmess is authorized to access the business network data.
- the benefits of a VPN are limited to discrete remote locations where the appropriate VPN software and/or hardware is installed. Accordingly, VPNs do not currently provide users with mobile remote access to network data stored behind business firewalls. In particular, a prior art VPN does not enable a user to access network data from a telephone while commuting in a moving vehicle.
- a VPN requires a port or hole to be opened in the business firewall so that data can be transmitted between the business network and the remote VPN node. It is over the VPN port that hardware or software must be installed to ensure that only authorized users are provided access to the network data.
- the potential for a hacker to obtain unauthorized access to the business network is increased. For instance, a hacker may attack the firewall at the business VPN node or may obtain ⁇ unauthorized access to network data by hacking into a remote user's computing device at the remote VPN node location.
- many businesses install secondary firewalls, so that if a hacker comes through the first firewall, they are more likely to be stopped before they penetrate the secondary firewall.
- FIG. 1 illustrates a typical firewall configuration for preventing unauthorized access to network data.
- This firewall configuration includes a primary firewall 20, a secondary firewall 28, and a demilitarized zone (DMZ) 30, which is the area between the primary firewall 20 and the secondary firewall 28.
- DMZ demilitarized zone
- Proxy servers are also beneficial for many other reasons, one of which is to enable users to access the Internet from behind a business firewall while enabling a business to limit the Internet sites that can be accessed. Proxy servers also hide the true identity of the Internet user by acting as a proxy in transmitting user requests. By acting as a proxy in transmitting user requests, the proxy server is able to filter user requests so that only qualified requests are honored. In essence, a proxy server can enhance the protection of a firewall infrastructure by prohibiting unauthorized requests from being honored. Proxy servers are particularly important for businesses that permit employees to access the Internet because Internet access requires additional holes or ports to be opened in the firewall infrastructure.
- ports typically include “port 80" and “port 443.”
- a firewall and proxy server can collectively operate to prevent unauthorized users on the Internet from obtaining control over the business network by ensuring that data transmitted through the ports complies with defined protocols. Even though Internet access initiated from within a busmess typically requires "port 80" and “port 443” to be opened in the firewall, the potential for a hacker to gain unauthorized remote access to a business network through "port 80" and “port 443” can be substantially limited by using appropriate firewall and proxy server configurations.
- VPNs are beneficial for enabling authorized users to access network data from remote locations, VPNs are likewise detrimental for facilitating unauthorized access to network data from remote locations.
- VPNs make it difficult to police business firewalls, make it difficult to use proxy servers, and in consequence, weaken firewalls and provide users, authorized or not, with too much control over network data.
- VPNs can also be very expensive to install and maintain. Nevertheless, because of today's business need for mobile professionals to have access to critical and urgent information away from the office, many businesses are willing to expend the resources and take the risks that are associated with establishing VPNs.
- the present invention relates to methods and systems for providing users with controlled mobile remote access to busmess network data through a virtual private network (VPN), without requiring the installation of expensive software or hardware at the business firewall, and without opening additional ports or holes in the business's firewall that would weaken the firewall infrastructure, but rather by establishing a secure data tunnel through a pre-opened Internet port.
- the present invention enables a mobile professional to remotely access critical and urgent business information such as email, from behind a business firewall, while on the move, without requiring remote access to be obtained from predefined, discrete VPN node locations that must be configured with expensive VPN software and hardware.
- a remote user is enabled to access network data from a busmess or enterprise location by communicating with a data center that has an established data tunnel with the enterprise network.
- the data tunnel is established when the ente ⁇ rise network transmits an initial data request to the data center and the data center replies with an ongoing transmission of reply data.
- the enterprise network transmits the initial data request and receives the reply data through a pre-opened network port, such as through Internet "port 80" or "port 443.”
- the data center uses a web server to communicate with the ente ⁇ rise network and the ente ⁇ rise network uses a spontaneous virtual private network (SVPN) module to communicate with the data center.
- the SVPN module initiates a data request from within the ente ⁇ rise network and monitors the resulting communication channel to ensure that it remains open.
- the SVPN module reinitiates the data request and opens a new channel.
- the data request includes a uniform resource identifier (URI), or a request to access resources associated with a web server of the data center.
- URI uniform resource identifier
- the web server of the data center transmits reply data associated with the URL back to the ente ⁇ rise network in an ongoing manner so that the communication channel between the data center and the ente ⁇ rise network remains open. In effect, the data center never completes the transmission of the reply data to the ente ⁇ rise network.
- the web server also updates a database of the data center of the status of any open communication channels. The database is particularly useful when the data center includes multiple web servers, only one of which has an open communication channel with the ente ⁇ rise network.
- the channel of communication between the data center and the ente ⁇ rise network is a data tunnel that operates as a VPN tunnel.
- TCP/IP Transmission Control Protocol/Internet Protocol
- HTTPS HyperText Transfer Protocol with Secure Sockets Layer Protocol
- IPsec IP Security Protocol
- data is encrypted in packets and transmitted through the data tunnel using "port 443" of the ente ⁇ rise network.
- the data tunnel is established through "port 80" and the data is encrypted using TCP/IP, IPsec, and HyperText Transfer Protocol (HTTP) without using Secure Sockets Layer Protocol (SSL).
- SSL Secure Sockets Layer Protocol
- a proxy server screens data transmitted through the ports to ensure compliance with the defined protocols.
- a remote user wishing to access network data from the ente ⁇ rise network opens a line of communication with the data center using a communication device such as a telephone device or a computer device that is connected to the Internet. The user then generates a request to access network data and transmits the request to the data center. If a telephone device is used, then the data center receives the access request at a telephony node and the telephony node transmits the access request to one of the web servers included in the data center. If the web server has an established data tunnel with the ente ⁇ rise network, then the access request is transmitted from the web server to the SVPN module of the ente ⁇ rise network through the data tunnel.
- the web server checks the database to see if there is another server of the data center that is transmitting reply data to the ente ⁇ rise network through an established data tunnel. If there is another web sever maintaining an open data tunnel with the ente ⁇ rise network, then the telephony node is notified and the access request is redirected to the other web server and subsequently transmitted from the other web server to the SVPN module of the ente ⁇ rise network.
- the ente ⁇ rise network processes the access request that is received at the
- processing the access request includes retrieving email data or web page data and transmitting the data back to the user.
- the SVPN module is configured in another embodiment to allow predefined functions to be performed on the network data, while preserving a business 's control over what data a remote user can access and manipulate.
- the predefined functions include, but are not limited to deleting email messages and faxing email messages to the user.
- the SVPN module establishes a second data tunnel with the data center by transmitting to the data center any requested data.
- the second data tunnel is a temporary data tunnel and is established between the ente ⁇ rise network and the same web server that is in communication with the ente ⁇ rise network over the first data tunnel.
- the second data tunnel is closed and the remote user is provided access to the network data as soon as the network data is received by the data center. If a telephone device is used by the user to communicate with the data center, then the requested network data is transmitted from the web server through the telephony node of the data center to the user's telephone device in an intelligible format, such as a digital display format or an audio format.
- the network data comprises an email message
- the text of the email can be displayed on the liquid crystal display (LCD) of the user's telephone device or read to the user over the telephone device.
- LCD liquid crystal display
- a user can access network data directly over the Internet by opening an Internet communication link directly with the web server of the data center.
- the data center authenticates the identity of the user before the user is enabled access to the requested network data. This is accomplished by requiring the user to enter a secret personal identification number.
- the present invention is an improvement over the prior art.
- the present invention enables a user to have mobile remote access to network data over a secure data tunnel while preserving a business 's ability to limit how much access to network data is permitted through the data tunnel.
- Figure 2 illustrates, in exemplary system that provides a suitable operating environment for the present invention, an ente ⁇ rise network in communication with a web server of a data center and a user in communication with a telephony node of the data center.
- Figure 3 illustrates a method for establishing a data tunnel between an ente ⁇ rise network and a data center which includes transmitting a data request from the ente ⁇ rise network to the data center, and the ente ⁇ rise network receiving reply data from the data center.
- Figure 4 illustrates a method for transmitting network data from an ente ⁇ rise network to a data center to enable a user access to the network data, wherein network data is transmitted through a data tunnel between the ente ⁇ rise network and a data center.
- Figure 5 illustrates a flow diagram of one embodiment of the method of the present invention for enabling a user to access network data from an ente ⁇ rise network.
- the present invention extends to both methods and systems for enabling user access to network data of an ente ⁇ rise network through a spontaneous virtual private network from a mobile remote location using a portable device.
- a user generates an access request for network data, such as email, using a telephone or computer device, and transmits the access request to a data center.
- the data center authenticates the identity of the user and transmits the access request to the appropriate ente ⁇ rise network through an established data tunnel that operates as a virtual private network (VPN).
- the data tunnel is opened in response to a data request that is transmitted from the ente ⁇ rise network to the data center.
- the ente ⁇ rise network retrieves network data and transmits the network data through a second data tunnel to the data center where it is subsequently transmitted to the user.
- Embodiments of the present invention include or are inco ⁇ orated in computer-readable media having computer-executable instructions or data structures stored thereon.
- Examples of computer-readable media include RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to carry or store desired program code means in the form of computer-executable instructions or data structures and which can be accessed by a general pu ⁇ ose or special pu ⁇ ose computer.
- When information is transferred or provided over a network, tunnel, channel or another communications connection (either hardwired, wireless, or a combination of hardwired or wireless) to a computer, the computer properly views the connection as a computer-readable medium.
- Computer-executable instructions comprise, for example, instructions and data which cause a general pu ⁇ ose computer, special pu ⁇ ose computer, or special pu ⁇ ose processing device to perform a certain function or group of functions.
- the computer-executable instructions and associated data structures or modules represent an example of program code means for executing the steps of the invention disclosed herein.
- the invention further extends to computer systems for enabling a remote user access to network data of an ente ⁇ rise network that is stored behind ente ⁇ rise network firewalls.
- SYSTEM ENVIRONMENT Figure 2 illustrates an embodiment of the systems and methods of the present invention for enabling a user 10 to access network data 22 of an ente ⁇ rise network 40 through a data tunnel 42 that operates as a virtual private network (VPN) between a data center 44 and the ente ⁇ rise network 40.
- ente ⁇ rise network 40 is a computer network of a business that contains network data 22 protected behind firewalls 20 and 28 from unauthorized access.
- the term "ente ⁇ rise network” should be broadly construed to include any computing environment where tasks are performed by processing devices that are linked together.
- the ente ⁇ rise network 40 may include, for example, the computing environment of any business, co ⁇ oration, individual, or other entity.
- computer-executable instructions and program modules for performing the features of the invention may be located in local and remote memory storage devices.
- Network data 22 and business network data should be construed to include any data that is stored in local and remote memory storage devices and is accessible to the ente ⁇ rise network 40.
- Network data 22 may include for example, email data or web page data.
- network data 22 is protected behind a firewall infrastructure that includes firewalls 20 and 28. It should be appreciated, however, that network data 22 may include any data that is accessible to the ente ⁇ rise network 40, even if it is not protected behind the firewall infrastructure.
- tunnel should be inte ⁇ reted to include any channel or other line of communication through which data can be securely transmitted.
- One skilled in the art will appreciate that there are numerous protocols and methods of encryption and authentication that can be employed to enable secure communication through a tunnel, such that the data transmitted through the tunnel is delivered only to an identified user who is authorized to access said data.
- tunnel operates as a virtual private network by enabling secure remote access to network data through a business's firewall infrastructure.
- a data tunnel 42 is established between the ente ⁇ rise network 40 and the data center 44.
- the data tunnel 42 is opened when the ente ⁇ rise network 40 transmits a data request 50 to the data center 44 and the data center 44 replies with an ongoing transmission of reply data 53.
- data request should be broadly construed to include a request for data from the data center and may include a uniform resource identifier (URI), which represents a request for the data center to provide access to a web page, HyperText Markup Language (HTML) data, Extensible Markup Language (XML) data, or other data resources of web server 60.
- URI uniform resource identifier
- firewalls 20 and 28 can include hardware, software, or a combination of both.
- a firewall is a security mechanism that prohibits access through designated ports of a network and ensures network data cannot be accessed from an unauthorized user from outside of the firewall.
- the data center 44 receives the data request 50 at a server, which in this embodiment includes web server 60.
- data center 44 may comprise multiple web servers 60, 60a, and 60b, as shown in Figure 2.
- Multiple web servers 60, 60a, and 60b enable the data center 44 to communicate with multiple ente ⁇ rise networks and to maintain multiple data tunnels, not shown.
- multiple data tunnels can be established between a single ente ⁇ rise network and a single web server or between a single ente ⁇ rise network and multiple web servers.
- the ente ⁇ rise network 40 uses a spontaneous virtual private network (SVPN) module 52 to actually transmit the data request 50 to the data center 44 and to receive the reply data 53 in response.
- Reply data 53 should be construed to include any data transmitted by the data center in response to receiving the data request 50 and which is transmitted in an ongoing manner so as to keep open the tunnel 42 between the data center 44 and the ente ⁇ rise network 40.
- this is accomplished when the ente ⁇ rise network 40 requests that the web server 60 open a web page, which can be any type of data resource, such as an HTML document or XML document, provided by the web server 60.
- web server 60 initiates the transmission of the web page and transmits it in an ongoing manner at a rate such that the transmission of the data has an indefinitely long duration. This keeps the tunnel 42 open by continually transmitting reply data 53 to the ente ⁇ rise network 40.
- the SVPN module 52 monitors the tunnel 42 to ensure that the tunnel 42 remains open. If for any reason the tunnel 42 is closed, the SVPN module opens a new data tunnel with the data center 44 by transmitting a new data request to the data center 44.
- the data center 44 includes a database 62.
- Database 62 keeps track of any data tunnel 42 that is maintained by web server 60.
- Web server 60 communicates with database 62 and notifies the database 62 of the status of the data tunnel 42. This enables the data center 44 to transmit a user's request for network data 22 to the appropriate web server 60.
- a user request for network data 22 is referred to herein as access request 70.
- Access request 70 is received by the data center 44 through a line of communication 84 that is initiated by the user 10.
- the user 10 generates the access request 70 and transmits the access request 70 to the data center 44 using a telephone device.
- telephony nodes 80 of the data center 44 receive the access request 70 from the user 10.
- the telephony nodes 80 communicate with web server 60. If web server 60 has a data tunnel 42 established with an appropriate ente ⁇ rise network 40 from which network data 22 is requested, then the access request 70 is transmitted to the web server 60.
- the web server 60 communicates with the database 62 to determine which web server, if any, does have a tunnel 42 established with the appropriate ente ⁇ rise network 40, in which case the access request 70 is redirected to the appropriate web server.
- the telephony nodes 80 communicate directly with the database 62 to ascertain which web server has an established tunnel with the appropriate ente ⁇ rise network 40 from which the access request 70 requires network data 22 to be accessed.
- a user initiates a line of communication 84 directly with the web server 60. This is accomplished, for example, when the user accesses the web server 60 over the Internet, or when a web page of the web server 60 is opened by the user over the Internet by means of a personal computer or another device that can provide graphical access to data.
- the data tunnel 42 between the data center 44 and the ente ⁇ rise network 40 uses Transmission Control Protocol/Internet Protocol (TCP/IP), HyperText Transfer Protocol with Secure Sockets Layer Protocol (HTTPS), and IP Security Protocol (IPsec). Using these protocols, data requests, network data, reply data and access requests are encrypted in packets and transmitted through the data tunnel 42 using "port 443", not shown, of the ente ⁇ rise network. "Port 443" is already open to enable users to access the Internet from the ente ⁇ rise network 40, within the firewalls 20 and 28.
- TCP/IP Transmission Control Protocol/Internet Protocol
- HTTPS HyperText Transfer Protocol with Secure Sockets Layer Protocol
- IPsec IP Security Protocol
- the data tunnel 42 is established through "port 80" of the ente ⁇ rise network, such that the data requests, network data, reply data and access requests are is encrypted using TCP/IP, IPsec, and HyperText Transfer Protocol (HTTP) without using Secure Sockets Layer Protocol (SSL).
- HTTP HyperText Transfer Protocol
- SSL Secure Sockets Layer Protocol
- the present invention may utilized any Internet tunneling protocol, including Layer Two Forwarding (L2F), and Layer Two Tunneling Protocol (L2TP).
- Port “80” is also already open to enable Internet access from within the firewall infrastructure of the ente ⁇ rise network 40.
- proxy server 82 filters through the data packets to verify that they comply with the defined protocols.
- the proxy server 82 enhances the protection of the firewall infrastructure by ensuring that only authorized data transmissions and requests are transmitted into or out of the ente ⁇ rise network 40 through the data tunnel 42.
- the present invention uses preexisting open ports in the firewall infrastructure to enable secure VPN type communication from remote mobile locations. Accordingly, it should also be appreciated that the present invention is an improvement over the prior art because additional ports are not required to be opened in the firewall infrastructure, which would require the installation of sophisticated and expensive VPN hardware and software.
- the present invention enables a proxy server to filter any data packets transmitted through the ports to ensure compliance with the defined protocols.
- the system and environment just described is a suitable environment and system for practicing the method of the present invention for enabling a user access to network data of an ente ⁇ rise network through a virtual private network from a remote location using a portable device.
- FIGs 4 and 5 One embodiment of the method of the present invention for enabling a user access to network data from a remote location is illustrated in Figures 4 and 5.
- a user 10 wishing to access network data 22 of the ente ⁇ rise network 40 from a remote location opens a line of communication 84 with the data center 44 using a communication device such as a telephony device or a computing device that is connected to the Internet.
- the data center 44 authenticates the identity of the user 10 to verify that the user 10 has authority to access network data 22 of the ente ⁇ rise network 40.
- the user's identity is authenticated when the user, using a telephony device or Internet computing device, enters a personal identification number.
- the user's identity is confirmed over the Internet using encryption technology, such as twin-key encryption, with corresponding public and private keys assigned to the user 10.
- encryption technology such as twin-key encryption
- Other methods for authenticating the identity of a user include, but are not limited to, tokens and smart cards.
- Access request 70 may include any request requiring access to network data 22.
- access request 70 may include a request to receive access to email messages, web pages or other data of the ente ⁇ rise network that is protected behind a firewall infrastructure or accessible to the ente ⁇ rise network.
- the user 10 uses a computer device to open a line of communication 84 with the web server 60 over the Internet.
- the access request 70 is received directly by the web server 60.
- a user 10 uses a telephone device to transmit the access request 70 to the data center 44.
- the access request is received indirectly by the web server 60 through telephony nodes 80, as described above in reference to Figure 2.
- the web server 60 Upon receiving the access request 70, the web server 60 transmits the access request 70 to the ente ⁇ rise network 40 through the established data tunnel 42 that was opened at the initial request of the ente ⁇ rise network 40, as described above with reference to Figures 2 and 3.
- the access request 70 is packetized with the reply data 53.
- Access request 70 is received by the ente ⁇ rise network 40 at the SVPN module 52.
- the ente ⁇ rise network 40 processes the access request 70 by performing any act on the network data 22 that is requested by the access request 70.
- the acts that can be performed on network data are limited to predefined acts according to the configuration of the SVPN module 52.
- the predefined acts can include any acts that an ente ⁇ rise network wishes to enable the SVPN module 52 to allow. By allowing the SVPN module 52 to control what acts are performed on the network data 22, the ente ⁇ rise network 40 is able to maintain control over access to network data 22 and can control how network data 22 is manipulated within in the ente ⁇ rise network 40.
- Predefined acts may include, but are not limited to, retrieving email headers, retrieving email message bodies, retrieving web page data, deleting email, faxing email data or web page data to the user, transmitting network data 22 to the data center 44.
- the SVPN module 52 obtains network data from the ente ⁇ rise network using an appropriate means, which may include, but is not limited to, Post Office Protocol (POP) or Simple Mail Transfer Protocol (SMTP).
- POP Post Office Protocol
- SMTP Simple Mail Transfer Protocol
- the SVPN module 52 transmits network data 22 back to the data center 44 over a second data tunnel 90.
- the second data tunnel 90 operates as a temporary virtual private network between the ente ⁇ rise network 40 and data center 44.
- Data tunnel 90 is established through the same port, Internet "port 443," that is used for data tunnel 42, and uses the same protocols discussed above to ensure security of the data transmission.
- "port 80" is used with corresponding protocols.
- Proxy server 82 ensures that desired protocols are complied with.
- Data tunnel 90 is established with the same web server 60 that is transmitting reply data 53 to the ente ⁇ rise network 40 or with another web server, not shown, of the data center 44. Data tunnel 90 is closed and the user 10 is provided access to network data 22 as soon as it is received by the data center 44. If a telephone device is used by the user 10 to communicate with the data center 44 then the network data 22 is transmitted from the web server 60 to the user through the telephony nodes 80, shown in Figure 2.
- network data 22 comprises an email message and the data center 44 reads the text of the email message to the user 10 over the user's telephone device, or alternatively displays the email message on the user's telephone device.
- the user 10 accesses network data 22 directly over the Internet from a line of communication 84 that is established directly with the web server 60.
- a user can generate any number of access requests which will each be processed discretely.
- the present invention enhances security and control over network data by preventing a user, authorized or not, from gaining too much control over network data.
- FIG. 5 illustrates a flow diagram of one embodiment of the present invention.
- the ente ⁇ rise network transmits a data request to the data center.
- the data center Upon receiving the data request, step 102, the data center transmits ongoing reply data back to the ente ⁇ rise network, step 104.
- the reply data includes Markup Language Data, such as HTML data and XML data.
- the ente ⁇ rise network receives the ongoing reply data.
- Steps 100-106 establish a data tunnel between the ente ⁇ rise network and the data center. In one embodiment, the data tunnel is established through port "443.” In another embodiment, the data tunnel is established through port "80.”
- a user accesses network data of the ente ⁇ rise network by first connecting to the data center, step 108. Next, the user generates and transmits an access request to the data center, step 110.
- the access request is generated by the user using a telephone device. In an alternative embodiment, the user generates the access request over the Internet using a computer.
- the data center Upon receiving the access request, step 112, the data center transmits the access request to the ente ⁇ rise network, step 114, through the data tunnel that was established in steps 100-106.
- step 116 the ente ⁇ rise network receives the access request and subsequently, in step 118, determines whether the access request is a valid access request. This may include verifying that the access request requires only predefined and authorized acts to be performed on the network data. It may also include the act of validating the identity of the user. As a matter of illustration, and not limitation, step 118 may result in the determination that retrieving an email message is a valid request and that running an attached executable program is not a valid request. The determination of what constitutes a valid access request can be predetermined and is controlled by the SVPN module. If the access request is not valid, the ente ⁇ rise network does not process the request, but waits until a valid request is received, step 120.
- the network data is retrieved, in step 124, and subsequently transmitted to the data center, step 128, through a temporary data tunnel that is opened between the ente ⁇ rise network and the data center, shown in step 126.
- the temporary data tunnel opened in step 126 is different than the data tunnel established in steps 100-106. It should be appreciated, however, that both tunnels can be established over the same ports of the ente ⁇ rise network.
- the temporary data tunnel is closed, step 130, and the ente ⁇ rise network waits for subsequent valid request to be received, step 120. If the access request requires an act to be performed, such as deleting email, faxing email messages, and forwarding email, the ente ⁇ rise network performs the required task, step 138, and waits for a subsequent valid request to be received, step 120.
- the data center transmits the requested network data to the user, step 134, as soon as it is received from the ente ⁇ rise network, step 132. In one embodiment, this is accomplished by displaying the requested network data on a web page that being viewed by the user. In another embodiment, the requested network data is transmitted to a telephone device that is being used by the user, in either digital format or in audio format.
- the user receives the requested network data, step 136, and either disconnects from the data center, step 138, or transmits a subsequent access request to the data center, step 110.
- a user can also access network data that is cached in the database of the data center.
- network data 22 is cached in database 62, even before the user 10 generates an access request 70 for the network data 22.
- This embodiment is particularly useful for enabling a user 10 to quickly access network data 22 when the network data 22 is disconnected.
- Network data 22 is disconnected whenever it is not easily or quickly retrievable by the ente ⁇ rise network 40. For example, if network data 22 is stored in a very large remote memory device within the ente ⁇ rise network 40, it may take several minutes for the network data 22 to be retrieved.
- Other network data 22 that is disconnected includes data that is stored on the desktop or local computer drive of a computer that is turned off.
- disconnected network data is any data that is stored on a portable computer or storage device that is periodically disconnected from the ente ⁇ rise network 40, such as a laptop computer or a PDA.
- the ente ⁇ rise network 40 establishes a new temporary data tunnel between the SVPN 52 and the web server 60.
- the temporary data tunnel is established in similar fashion to that of data tunnel 90, which is described in reference to Figure 4.
- network data 22 is uploaded to the database 62 of the data center 44 through the temporary data tunnel.
- the process of uploading the network data 22 includes the act of packetizing the network data according to the established protocols that have been described above.
- the data center 44 caches a copy of the network data 22 in the database 62.
- the cached copy of network data 22 is updated whenever a newer version of the network data 22 is received by the database 60.
- the frequency of which newer versions of the network data 22 are received is predetermined by the authorization and configuration of the ente ⁇ rise network 40.
- the ente ⁇ rise network generates notices that are received by all users of the ente ⁇ rise network.
- the notices remind the users to upload their email contacts, address lists, co ⁇ orate files, and other designated network data 22 so that the updated data can be retrieved off site, away from the ente ⁇ rise network 40.
- the user 10 controls what network data 22 is transmitted to the data center 44 and what network data 22 is cached in the database 62 according to how the user 10 responds.
- the user 10 may, for example, respond by ignoring the notice.
- the user 10 may respond by initiating a command that allows the SVPN 52 module to upload the designated network data 22 to the database 62 of the data center 44.
- the updates to the network data are transmitted through a temporary data tuimel that is established between the SVPN 52 module and the web server 60.
- the web server 60 Upon receiving the data packets, the web server 60 decrypts the user's network data 22 and sends it to database 62 where it is cached.
- this embodiment enables a user to synchronize disconnected data over a temporary data tuimel that operates as a virtual private network so that it can be accessed from a remote location at a later time.
- This embodiment also enables a user to quickly access a copy of the network data, which is cached in the database of the data center, when network data is disconnected from the ente ⁇ rise network.
- Network data is disconnected, for example, when it is stored on a portable and physically disconnected computer, stored on a disabled network storage drive, when the network data is difficult to retrieve because of network problems, and when the network data takes a long time to retrieve because of slow connections and processing speeds.
- a user 10 accesses network data 22, such as email contacts, by calling into the data center 44 using a telephone system and by generating an access request 70 for the network data 22.
- Telephony nodes 80 at the data center 44 receive the user's call and accompanying access request 70.
- the telephony nodes 80 also retrieve the uploaded network data 22 from the database 62 and transmit the uploaded network data 22 back to the user 10.
- the user 10 accesses the data center 44 directly over the Internet, in which case the web server 60 retrieves the user's uploaded network data 22 from the database 62 and transmits it back to the user 10.
- the present embodiment also enables a user 10 to update network data 22 by issuing commands directly to the data center 44 over an established line of communication 84 between the user 10 and the data center 44.
- a user can issue a command to delete an email contact from the cached copy of network data stored in the database of the data center.
- the data center 44 responds by deleting the email contact, which effectively updates the cached copy of the network data at the data center.
- Data center 44 then transmits information regarding the update to the ente ⁇ rise network 40. This is accomplished by embedding the update information within the reply data 53 that is being transmitted to the ente ⁇ rise network 40 through an established data tunnel, such as data tunnel 42.
- the transmission of reply data 53 is shown and described in more detail in reference to Figures 3 and 4.
- the SVPN module receives the network data updates and updates the ente ⁇ rise network data accordingly. This synchronizes the ente ⁇ rise network data 22 with the cached copy of the network data that is stored in database 62 of the data center 44. It should be appreciated that this embodiment enables a remote user to update network data that is stored at the database of the data center and to further update network data stored at the ente ⁇ rise network by synchronizing the network data of the ente ⁇ rise network with the updated cache copy of network data stored at the data center.
- the present invention is an improvement over the prior art.
- the present invention enables a user to have mobile remote access to network data over a secure data channel while preserving a business' s ability to limit how much access to network data is permitted through the data channel.
- the present invention also enables a remote user to access network data that is disconnected from the ente ⁇ rise network.
- the present invention enables a user to update network data from a remote location over a virtual private network data tunnel.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Computer And Data Communications (AREA)
Abstract
Description
Claims
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2002551723A JP3909289B2 (en) | 2000-12-20 | 2001-12-19 | Voluntary virtual private network between portable device and corporate network |
AU2002231001A AU2002231001A1 (en) | 2000-12-20 | 2001-12-19 | Spontaneous virtual private network between portable device and enterprise network |
EP01991262.5A EP1350171B1 (en) | 2000-12-20 | 2001-12-19 | Spontaneous virtual private network between portable device and enterprise network |
CA002430266A CA2430266A1 (en) | 2000-12-20 | 2001-12-19 | Spontaneous virtual private network between portable device and enterprise network |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US25748000P | 2000-12-20 | 2000-12-20 | |
US60/257,481 | 2000-12-20 | ||
US09/767,465 | 2001-01-22 | ||
US09/767,465 US7124189B2 (en) | 2000-12-20 | 2001-01-22 | Spontaneous virtual private network between portable device and enterprise network |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2002050695A1 true WO2002050695A1 (en) | 2002-06-27 |
Family
ID=56290225
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2001/048993 WO2002050695A1 (en) | 2000-12-20 | 2001-12-19 | Spontaneous virtual private network between portable device and enterprise network |
Country Status (4)
Country | Link |
---|---|
JP (1) | JP3909289B2 (en) |
AU (1) | AU2002231001A1 (en) |
CA (1) | CA2430266A1 (en) |
WO (1) | WO2002050695A1 (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1381190A1 (en) * | 2002-07-12 | 2004-01-14 | Alcatel | Method for accessing a virtual private network resource based on uniform resource identifiers |
WO2005022838A1 (en) * | 2003-08-29 | 2005-03-10 | Nokia Corporation | Personal remote firewall |
WO2013067904A1 (en) * | 2011-11-07 | 2013-05-16 | 华为技术有限公司 | Inter-domain virtual private network interfacing method and device |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2014098981A (en) * | 2012-11-13 | 2014-05-29 | Oki Electric Ind Co Ltd | Data management device and program |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6081900A (en) * | 1999-03-16 | 2000-06-27 | Novell, Inc. | Secure intranet access |
US6092113A (en) * | 1996-08-29 | 2000-07-18 | Kokusai Denshin Denwa, Co., Ltd. | Method for constructing a VPN having an assured bandwidth |
US6092200A (en) * | 1997-08-01 | 2000-07-18 | Novell, Inc. | Method and apparatus for providing a virtual private network |
-
2001
- 2001-12-19 AU AU2002231001A patent/AU2002231001A1/en not_active Abandoned
- 2001-12-19 CA CA002430266A patent/CA2430266A1/en not_active Abandoned
- 2001-12-19 WO PCT/US2001/048993 patent/WO2002050695A1/en active Search and Examination
- 2001-12-19 JP JP2002551723A patent/JP3909289B2/en not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6092113A (en) * | 1996-08-29 | 2000-07-18 | Kokusai Denshin Denwa, Co., Ltd. | Method for constructing a VPN having an assured bandwidth |
US6092200A (en) * | 1997-08-01 | 2000-07-18 | Novell, Inc. | Method and apparatus for providing a virtual private network |
US6081900A (en) * | 1999-03-16 | 2000-06-27 | Novell, Inc. | Secure intranet access |
Non-Patent Citations (3)
Title |
---|
AQUN ET AL.: "Research on tunneling techniques in virtual private networks", IEEE, August 2000 (2000-08-01), pages 691 - 697, XP002908631 * |
COBB S.: "Security issues in internet commerce", IEEE, July 1996 (1996-07-01), pages 186 - 191, XP002908630 * |
See also references of EP1350171A4 * |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1381190A1 (en) * | 2002-07-12 | 2004-01-14 | Alcatel | Method for accessing a virtual private network resource based on uniform resource identifiers |
WO2005022838A1 (en) * | 2003-08-29 | 2005-03-10 | Nokia Corporation | Personal remote firewall |
CN100456729C (en) * | 2003-08-29 | 2009-01-28 | 诺基亚公司 | Personal remote firewall |
US7734647B2 (en) | 2003-08-29 | 2010-06-08 | Nokia Corporation | Personal remote firewall |
WO2013067904A1 (en) * | 2011-11-07 | 2013-05-16 | 华为技术有限公司 | Inter-domain virtual private network interfacing method and device |
EP2590369A3 (en) * | 2011-11-07 | 2013-06-05 | Huawei Technologies Co., Ltd. | Method and device for connecting to virtual private network across domains |
Also Published As
Publication number | Publication date |
---|---|
CA2430266A1 (en) | 2002-06-27 |
AU2002231001A1 (en) | 2002-07-01 |
JP2005501432A (en) | 2005-01-13 |
JP3909289B2 (en) | 2007-04-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP1350171B1 (en) | Spontaneous virtual private network between portable device and enterprise network | |
US7673133B2 (en) | Virtual private network between computing network and remote device | |
US6351810B2 (en) | Self-contained and secured access to remote servers | |
US6742127B2 (en) | Method and apparatus for maintaining security in a push server | |
CN102047262B (en) | Authentication for distributed secure content management system | |
US8010997B2 (en) | Enforcing device settings for mobile devices | |
EP0967765B1 (en) | Network connection controlling method and system thereof | |
US7565526B1 (en) | Three component secure tunnel | |
EP1854243B1 (en) | Mapping an encrypted https network packet to a specific url name and other data without decryption outside of a secure web server | |
US20030070084A1 (en) | Managing a network security application | |
US20030196084A1 (en) | System and method for secure wireless communications using PKI | |
US20090025080A1 (en) | System and method for authenticating a client to a server via an ipsec vpn and facilitating a secure migration to ssl vpn remote access | |
Zhipeng et al. | VPN: a boon or trap?: a comparative study of MPLs, IPSec, and SSL virtual private networks | |
EP1775903B1 (en) | A dynamic tunnel construction method for secure access to a private LAN and apparatus therefor | |
US20060143301A1 (en) | Systems and methods for establishing and validating secure network sessions | |
US20090193127A1 (en) | Systems and Methods for Establishing and Validating Secure Network Sessions | |
JP2014082638A (en) | Virtual network construction system, virtual network construction method, small terminal, and an authentication server | |
CN114499976A (en) | Data exchange method for realizing cross-network exchange | |
JP3909289B2 (en) | Voluntary virtual private network between portable device and corporate network | |
Chen et al. | Research on meteorological information network security system based on VPN Technology | |
JP2004062416A (en) | Method for preventing illegal access, method for downloading security policy, personal computer, and policy server | |
WO2018160226A1 (en) | Secure authentication and data transfer for cloud systems | |
Cisco | Enhancing Management Security | |
Zhuge et al. | Security mechanisms for wireless home network | |
JP2008228064A (en) | Communication control system and communication control method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PH PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG UZ VN YU ZA ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2430266 Country of ref document: CA |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2002231001 Country of ref document: AU |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2001991262 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2002551723 Country of ref document: JP |
|
WWP | Wipo information: published in national office |
Ref document number: 2001991262 Country of ref document: EP |
|
REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |
|
DPE2 | Request for preliminary examination filed before expiration of 19th month from priority date (pct application filed from 20040101) |