The present invention is directed toward providing connectivity to employer networks for support personnel and consultants who regularly work in customer locations and, more particularly, toward providing such connectivity in a secure manner from both the employer and customer standpoints.
VPN connections are common in the industry and allow users with general Internet access to connect from home networks to their employer networks in a secure fashion. However, Internet connections from within a company, such as a customer facility, are usually are limited for security purposes to a few ports (usually port 80 for HTTP), and will not allow other activity which may be required for a visitor to access mail and other applications in his/her remote employer “home” office. The required VPN access is usually not allowed for vendors, consultants and support personnel from other companies that may be working from within a customer location. If a VPN connection is allowed, it will usually let any data flow from the customer location to the consultant employer network, and is therefore not secure from the customer standpoint.
What is needed then is an improved method of allowing access by visiting personnel at a customer location to their own company intranet in a secure manner that both companies can trust.
The present invention is directed toward overcoming one of more of the above-identified problems.
The present invention provides a secure network mechanism to connect the users/consultants at a customer location with their employer network for the purpose of accessing email, reference material, and specialized application databases at their “home” company. Specifically, the present invention allows this network connectivity to take place based on business rules and is logged and controlled by a central system to reduce the possibility of sensitive information being transferred out of a customer location.
The major components of the inventive system are specialized network routers that allow the host company to limit exposure to external threats while allowing regular visitors access to their employer intranets. This is achieved by using a set of router/VPN servers that appropriately route traffic while maintaining network name server capabilities across the networks. A main component of the present invention is the ability to control the router systems via a central system resulting in a dynamic access network which is controlled based on conditions at the time.
It is an object of the present invention to provide secure connectivity to employer networks for support personnel and consultants who regularly work in customer locations.
It is a further object of the present invention to provide providing such connectivity in a secure manner from both the employer and customer standpoints.
It is yet a further object of the present invention to provide secure connectivity which will allow the host company to limit exposure to external threats while allowing regular visitors access to their employer intranets.
Other objects, aspects and advantages of the present invention can be obtained from a study of the specification, the drawings, and the appended claims.
The foregoing and other features and advantages of the present invention will be apparent from the following, more particular description of a preferred embodiment of the invention, as illustrated in the accompanying drawings wherein like reference numbers generally indicate identical, functionally similar, and/or structurally similar elements.
As used herein, the following terms shall have the following meanings:
“Customer”: A customer is a specific business facility. Other suppliers may be in this location and attached to this network, even though they are not employees of a customer.
“Consultant”: An employee of a business other than a customer who needs to be in a customer facility but also needs to have access to their own employer's network and applications.
“Authentication”: The process that identifies a person (a common method is user ID and password).
“Authorization”: The process that determines what a person is allowed to do, such as transfer files.
“DHCP”: Dynamic Host Configuration Protocol. A methodology where a network address is dynamically assigned to a computer when it is plugged into a network.
“DNS Name”: A fully qualified hostname that includes the domain (e.g., “mailman.ilstechnology.com”).
“eCentre”: An application that is used for secure collaboration. In this context, it is a sample application that can be used with the present invention to provide other .
“Host Name Resolution Table”: A list of computer addresses and their names for the purpose of identifying the physical IP associated with the host name. This is common in standard networks, but even more critical for systems used in multiple networks to resolve the correct system in the correct network.
“Internet Protocol Address (IP)”: The Internet address of a system (e.g., “192.168.1.19”).
“IPSec”: Standard protocol for secure communication.
“Naming for Systems”: The names and associated addresses of network computers.
“Network Mapping (NATing)”: Methodology used to map network addresses between two different networks.
“Privileges”: Permissions that are set by the administrator to allow or deny users access to services such as a VPN access. By setting access privileges, the administrator controls user access to restricted data.
“ServiceNet”: A particular implementation of a hub based multipoint to multipoint VPN connection service.
“System Network Administrator”: A special type of person who is an employee of the customer facility. The customer system network administrator (or simply network administrator) is responsible for setting up and managing routers, firewalls and their access control lists. The administrator also assigns user passwords and access privileges, and delegates administrative duties where appropriate.
“Virtual Private Network (VPN)”: A connection between a user from outside a business to inside that business in a secure fashion.
Various embodiments of the present invention are discussed in detail below. While specific exemplary embodiments are discussed, it should be understood that this is done for illustration purposes only. A person skilled in the relevant art will recognize that other components and configurations can be used without departing from the spirit and scope of the invention.
Prior Approaches
There are several connectivity options available today for support or consultant personnel who work at customer locations and need to access their home network and systems. There may be other connectivity options that are not described below, but these are some of the most common implementations. For the purpose of example, we assume the consultant has to access both an e-mail system and a specific application server that reside in their employer's network.
Option 1: Connect to host systems that have been made available on the web. However, this can only be done if the mail system and the application system at the employer network have a user interface that allows web browser access (usually HTTP on port 80). The employer business would also have to make these servers viewable from the Internet rather than being in their local business network, thus exposing them to security issues.
Option 2a: Another common option is to create a standard site-to-site VPN connection as shown in
Option 2b: In this case, companies could use the site-to-site VPN connection described in Option 2a above, and limit it further to allow access between a limited set of system addresses or IPs. This reduces the exposure to a limited number of systems, in theory, but users can still use the original connection to telnet to another system and gain access to other systems that were not originally intended for access.
What is therefore needed is an alternative solution, such as the inventive business-to-business remote network connectivity system described herein, which creates an environment that mimics a standard VPN connection for the end user, but also provides two key improvements: 1) better security through control of activities and inspection of each data packet; and 2) a host name resolution table to the client so naming issues are resolved transparently, and also allows multiple networks with the same subnet naming scheme (i.e., “192.168.1.x”) to interact without specialized address natting.
Inventive Business-to-Business Connection
As shown in
The consultant still connects his/her workstation 100 to the customer network and, specifically, connects to an extended customer secure gateway controller 300. In the present invention, there are now multiple VPNs 700, 800 and 900 created that provide for end to end security and inspection of packet detail. These actions are controlled by the traffic control hub 500 and extended with the IP map DB 530 domain name mapping information.
The VPN2 connection 800 used in step 4 (see
In step 2, the consultant starts his/her part of the VPN 700a (see
Then, in steps 8 and 9, additional data is transferred from the secure gateway controller 300 to the consultant workstation 100. This data is the newly assigned subnet address, such as “10.10.20.22” and the required name resolution table entries that allow the consultant workstation 100 to request to connect to a server referred to by a fully qualified domain name such as, for example, “mail.ilstechnology.com”,and get the correct server in his/her home network, as opposed to a server which may have the same name in the customer network. The subnet address in its general form is denoted by “10.10.20.x”,where “10.10.20” defines the subnet and the “x” portion denotes the particular workstation 100. Multiple workstations, having different subnet addresses, may thus use the same subnet. Typically, the subnet will be unique to the consultant employer, such that consultants from the same employer will use the same subnet regardless of the customer location at which they are located. However, one skilled in the art will appreciate that the inventive system will still be fully operational even if the subnets are not unique to the various consultant employers.
In step 8, the secure gateway controller 300 assigns a logical new address on a particular subnet to that consultant workstation 100. In essence, a virtual “tunnel” is created for the transfer of information. This new address subnet can be associated with the vendor name of the consultant. In this example, the secondary address of the workstation 100 (for within the VPN environment) may be “10.10.20.22”. This subnet address can be fixed for a particular user consultant so that the always get this address no matter which customer location they start from. This would allow them to gain access to applications that may have restrictions by IP address. In this example, the “192.168.1.22” address that was originally assigned by the customer's DHCP remains unchanged. The consultant workstation 100 now has two DNS references, one for the customer network and one for the home employer network.
In step 9, a secondary method for domain name resolution is established by creating a local name resolution table for the consultant from the traffic control hub 500 back through the customer secure gateway controller 300 and then on to the consultant workstation 100. The name server definitions from the traffic control hub 500 are added to the consultant workstation 100. The consultant application server names and related addresses (IPs) on the workstation 100 which are configured to point to the consultant employer's network remain unchanged and will be automatically routed through the combination of tunnels to the employer's network. A copy of the name resolution table is maintained on the customer secure gateway controller 300, so that they can be sent directly from the controller 300 to the consultant workstation 100 without making a request to the traffic control hub 500. These local copies can be updated at regular intervals or based on changes.
An alternate method is to add a secondary domain name server entry at the workstation 100 which points to a server on the employer network.
In step 10, the consultant workstation 100 makes a request to connect to a home mail system. This request goes through the VPN1 tunnel 700 (see
In step 11, another VPN2800 is utilized, this time from the customer secure gateway controller 300 to the central traffic control hub 500. All traffic from a particular customer site is routed to the same port on the traffic control hub 500, so that the destination environment is well understood. During the initial start-up of the customer secure gateway controller 300, the controller 300 passes x509 Certs to establish its identity to the hub 500. The traffic control hub 500 responds to the request and establishes the second VPN2800 in the communication chain. This creates the VPN2800 tunnel which is used whenever another consultant workstation 100 requests external access.
The traffic control hub 500 looks up the destination information, in step 12, in a local table and forwards the information, in step 13, down the VPN3 tunnel 900 (see
In step 13, using the pre-established tunnels from the traffic control hub 500, a third VPN3900 connection is used. Based on the information that originally came from the customer secure gateway controller 300 (port number of original connection and the subnet (e.g., “10.10.20.x”) assigned to the workstation 100), the traffic control hub 500 is able to determine that the connection was from a particular vendor or consultant company, and all the traffic is thus routed to the appropriate consultant employer gateway controller 400. There is now secure end to end connectivity of the parties. Each consultant company may be assigned a separate port on the traffic control hub 500 so that additional control measures can be used as necessary to separate access.
During operation, customers and consultant companies can take advantage of the chain of VPNs 700, 800 and 900, as shown in
For the traffic control hub 500 to function properly, the following information is maintained and used from the IP map DB 530. There are a set of tables which map a particular customer subnet and port number on the inside of the customer secure gateway controller 300 to a particular vendor IP and port number on the outgoing side of the traffic control hub 500. The combination of IP addresses and specific ports provide information about who is trying to connect (i.e., which consultant). There is also a set of DNS tables that are specified by each employer as they are defined in the system. The employers provide a list of servers, such as the mail server 210 or application server 212, which their consultants would normally access from a customer site. These are stored in the IP map DB 530 on the traffic control hub 500 for sharing with the local customer secure gateway controller 300. When a consultant workstation 100 requests a connection to the secure gateway controller 300, this secondary DNS information is provided back to the workstation 100.
This means that the workstation 100 has two DNS tables, one provided to it at the original network connection with the DHCP addressing and one provided to it from the VPN1700 connection. The DNS entry from the VPN1700 connection is stored in local memory associated with that network address until that VPN1700 connection is no longer available.
Generally, the customer secure gateway controller 300 will have multiple ports facing the “inside” customer network, with each vendor/consultant company having a dedicated port. For example, consultants or vendors from Company A will always access the customer secure gateway controller 300 via the same dedicated port. Multiple consultants/vendors can utilize the ports concurrently. By assigning each port to a different vendor/consultant company, the customer can manage an entire set of vendor VPN connections with a single customer secure gateway controller 300.
For the customer secure gateway controller 300 to function properly, the following information is maintained and used. Consultants from a particular company all use the same incoming port for their connection to the customer secure gateway controller 300. There is a separate port for each consultant company so that the correct mapping of their home consultant employer network can be provided back to them. On the “outbound” side of the secure gateway controller 300, there is a single port to the traffic control hub 500 allowing for easier management of tunnels where the outbound traffic can share the same tunnel. The traffic on this single tunnel is identified by the combination of subnet address (assigned based on the original port connection to the customer secure gateway controller 300) and incoming port. These are looked up in the network routing table at the traffic control hub 500 for delivery to the correct location.
In the case of workstation 100, the consultant is at Company 1 connected to their secure gateway controller 300, and has a DNS entry that allows him to route to his/her employer mail server 210 and/or application server 212 at his/her employer network with no changes to the local workstation (other than what is done automatically by the present invention). In the case of workstation 150, the same workstation is now connected to the Customer 2 network and to their secure gateway controller 350, and can also make connections to his/her employer mail server 210 and/or application server 212 at his/her employer network with no changes. Similarly, workstation 160 is connected to the secure gateway controller 360 at Customer 3 and routed back to his/her mail server 210 at his/her employer network. Based on the rules allowed by each customer, however, a different set of access rights may be allowed or denied.
In each case, a secondary Domain Name Server (DNS) has been provided to the consultant workstations 100, 150, 160. However, the customer has control of the contents of this new DNS system. In the case of Customers 1 and 2, they have allowed both systems (mail 210 and application 212) at the consultant employer's network to be reachable by allowing their respective DNS 303 and 353 to contain all the requested entries for fully qualified domain names. However, in the case of Customer 3, they have limited their allowed DNS 363 to contain only a single entry of the fully qualified domain name of the mail 210 to be accessible. Therefore, the customers have secure control over what is allowed to happen in their network.
As shown in
Similarly, consultant workstation 150 (from company A) at Customer 2, will connect to a dedicated port on Customer 2's secure gateway controller 350, with consultant workstation 152 (from company B) at Customer 2 connecting to a different dedicated port on Customer 2's secure gateway controller 350.
Each customer secure gateway controller 300, 350 will have a separate port on which to connect to the traffic control hub 500. For example, as shown in
Additionally, each employer gateway controller connects to a dedicated ports on the outbound side of the traffic control hub 500. For example, company B's gateway controller 400 connects to port 4000, while company A's gateway controller 450 connects to port 3000. This also helps to keep communication streams separate and allows for mapping of the subnets.
An added feature of the inventive solution is that the customer secure gateway controller 300 can be altered programmatically. Based on this feature, it can be combined with the features of other products, such as eCentre 1000, to further control the overall solution so that accessibility may be based on business rules. For example, the time of access might be limited, or access granted only if there was an approval or only if a certain condition happened in another application. This communication is shown in
In a similar fashion, the customer gateway controller 300 can be linked to external applications 1100, such as a company's LDAP user management system. In this way, the original user certification and password presented by the consultant workstation 100 to the customer secure gateway controller 300 may be passed, via the traffic control hub 500, to an external program 1100 for verification of the user consultant. In this manner, each consultant can present a certificate from a certificate authority used by their company such as, but not limited to, Verisign, Thawte, Self signed certs, etc.
Some of the benefits and features of the present invention are:
While various embodiments of the present invention have been described above, it should be understood that they have been presented by way of example only, and not limitation. For example, the terms “consultant”, “vendor”,“customer” and “employer” are used herein and in the claims for point of reference only. The present invention is designed to provide secure communication between any two networks via the VPN connections and the traffic controller hub. Thus, the breadth and scope of the present invention should not be limited by any of the above-described exemplary embodiments, but should instead be defined only in accordance with the following claims and their equivalents.
While the present invention has been described with particular reference to the drawings, it should be understood that various modifications could be made without departing from the spirit and scope of the present invention.
The following set of claims is not limiting, but is merely exemplary of preferred aspects of the present invention. It is to be understood that the present patent application instead covers all aspects of the present invention as shown and described herein.
This application claims the benefit of co-pending provisional patent application Ser. No. 60/739,752 entitled “Business to Business Remote Network Connectivity”, filed on Nov. 23, 2005, the entire disclosure of which is incorporated by reference herein. This application is related to U.S. patent application Ser. No. 10/385,479 entitled “Diagnostic System and Method for Integrated Remote Tool Access, Data Collection, and Control”, filed Mar. 12, 2003, and also to U.S. patent application Ser. No. 10/385,442 entitled “Data Sharing and Networking System for Integrated Remote Tool Access, Data Collection, and Control”, filed on Mar. 12, 2003, the entire disclosures of which are hereby incorporated by reference herein.
Number | Date | Country | |
---|---|---|---|
60739752 | Nov 2005 | US |