Field of the Invention
This invention relates generally to establishing communications sessions and, more particularly, to a system and method for automatically initiating an integrated virtual private network connection to establish a desired communications session.
Description of the Prior Art
It is well established that for some communications protocols, the ability of a user to access to certain ports or addresses from a network enabled device on a particular network may be limited through network controls beyond the user's control. For example, it is common for access to session initiation protocol (“SIP”) ports to be blocked by a firewall or router as controlled by a local network administrator such as a coffee shop or hotel. In some cases, such ports or other addresses may be blocked on a larger scale by an Internet Service Provider under the control or at the behest of a jurisdictional authority (i.e., a government).
Therefore, a problem which exists is that if access to a particular desired communications protocol has been blocked on the network a user is connected to, there is typically no recourse for the user to access the data or services available on the desired communications protocol. Thus, there remains a need for a system and method that would enable a user to access a port or address that has been blocked on the network the user is presently connected to.
The use of virtual private networks (“VPN”), to directly connect a network enabled device that is connected to a public network, such as the Internet, to a private network as if it were directly connected to the private network is well known. VPNs, which are created by establishing a virtual point-to-point connection, essentially extending the private network across the public network for such a network enabled device. By connecting to the private network in this manner, the network enabled device is able to access the features and data available to the private network while benefiting from the functionality, speed, economy, and management policies of the public network.
Accordingly, what is needed is a system and method for automatically establishing a virtual point-to-point connection with a remote server when a desired port or network address has been blocked for the purposes of establishing a connection to the desired port or address or for the purpose of securing the both the metadata of the communication as well as the actual media stream (audio and optionally video and other data).
The Applicant's invention described herein provides for a system and method for automatically initiating a VPN connection for the purposes of establishing a connection to a blocked resource and/or securing the communication through the VPN. When in operation, the system and method, upon detecting an access restrictions on a network for a desired end point, enables the automatic establishment of a VPN connection through which it can avoid detected access restrictions. As a result, many of the limitations imposed by prior art systems are removed.
A system and method for initiating a VPN connection for the purposes of establishing an indirect connection to a network resource through the VPN includes an initiation device, an end target, and a VPN server. In an exemplary embodiment, the initiation device may define a conventional ATA operating as a SIP client, the end target may define a network destination resource, such as a SIP endpoint, that is sought to be accessed by a user of the initiation device over the Internet through a proximal computer network through which the initiation device connects to the Internet.
The process through which a VPN connection is initiated in order to establish a connection to a network destination through the VPN begins with the initiation device being directed to or otherwise attempting the access a target network destination. This connection attempt is then held, either because the destination is blocked or because it defines a secure address that requires a secure connection. Then, the initiation device contacts a VPN server and establishes a connection to the VPN server's network. Once connected to the VPN server's network, the initiation device allows the connection to be made to the target network destination through the initiation device's connection the VPN server's network.
It is an object of this invention to provide a system and method for automatically establishing a virtual point-to-point connection with a remote server when a desired port or network address has been blocked for the purposes of establishing a connection to the desired port or address or for the purpose of securing the both the metadata of the communication as well as the actual media stream.
This and other objects will be apparent to one of skill in the art.
Referring now to the drawings and in particular
The end target 20 defines the desired port/Internet Protocol (“IP”) address or network resource (collectively, “network destination”) that is sought to be accessed by a user of the initiation device 10 over a computer network. In the illustrated embodiment, the end target 20 defines a desired SIP endpoint (generally port 5060 or 5061). It is appreciated, however, that in alternate embodiments, the end target 20 may define any specified IP address or network resource with which a network connection is desired.
In the illustrated embodiment, the VPN server 30 defines a conventional VPN provider public network interface that facilitates the availing of remote access to the VPN to authenticated devices. It is contemplated that in some embodiments, there may be a private data connection or a VPN between the VPN server 30 and the end target 20 (as opposed to a public network connection as illustrated).
It is appreciated that by employing a VPN, a user may take advantage of a tunnel networking between a device and a server to go around blocks or restrictions and/or a secure networking that includes encryption so the nature and content of all communications are not easily/readily snooped or otherwise captured.
Referring now to
The process through which an integrated VPN connection is automatically initiated for the purposes of establishing a connection to a blocked network resource through the VPN begins with the designation of a secure target or several secure targets on the initiation device 10. In the embodiment illustrated in
Whenever the initiation device 10 connected to its proximal network is directed to connect to an end target 20, it first determines whether of the end target's 20 IP address (or access a network resource) has been designated as a secure target. If the end target's 20 IP address has not been designated as a secure target, the initiation device 10 proceeds to connect to the desired end target 20 through its connection to the proximal network. On the other hand, if the end target's 20 IP address has been designated as a secure target, the initiation device 10 holds the connection attempt, pending the establishment of a connection to the VPN server 30 as detailed below.
Once a connection attempt has been delayed, the initiation device 10 contacts the VPN server 30 through its connection to the proximal network, is authenticated and establishes a connection to the VPN server's 30 network. It is contemplated that if the VPN server's 30 network is connected to a public network, such as the Internet (which is how the initiation device 10 accessed it remotely in the first place), any network enabled device that is connected to the VPN server's 30 network can access such a public network through the VPN server's 30 network. Accordingly, once connected to the VPN server's 30 network, the initiation device 10 releases the hold on the connection attempt to the end target's 20 IP address, allowing the connection to be made through the initiation device's 10 connection the VPN server's 30 network.
In an alternate implementation, the method for automatically initiating a VPN connection for the purposes of establishing an indirect connection to a network resource through the VPN is employed for the addition of security to a communication. In this embodiment, the initiation device 10 defines a conventional ATA operating as a SIP client and attempting to initiate a secured communications session.
The process through which an integrated VPN connection is automatically initiated for the purposes of securing a connection for a communications session through the VPN begins with the designation of a secure target or several secure targets on the initiation device 10. In the embodiment illustrated in
Whenever the initiation device 10 connected to its proximal network is directed to connect to an end target 20, it first determines whether of the desired connection involves a secure target. In this case, the secure target may represent a telephone number (or VoIP pointer) or an IP address (or access a network resource) which has been designated as a secure target. If the desired connection does not involve a secure target, the initiation device 10 proceeds to connect to the desired end target 20 through its connection to the proximal network. On the other hand, if the desired connection involves a secure target, the initiation device 10 holds the connection attempt, pending the establishment of a connection to the VPN server 30 in the same manner detailed above.
It is contemplated that the initiation device 10 may include in its memory a listing of network resources that are secure targets. In other embodiments, the initiation device 10 may retrieve over the network a listing of network resources that are secure targets.
It is appreciated that as the data communicated between the initiation device 10 and the VPN server 30 will be encrypted, the network activity through the VPN server's 30 network will not be apparent to the proximal network.
Referring now to
The process through which an integrated VPN connection is selectively initiated for the purposes of establishing a connection to a network resource through the VPN begins with the initiation device 10 connected to its proximal network failing in an attempt to connect to a desired end target 20. The initiation device 10 then determines whether of the end target's 20 IP address (or access a network resource) is a secure address. For example, in some embodiments, a secure address may be a SIP address (in others, it could be an Extensible Messaging and Presence Protocol address or a MQTT address). If the end target's 20 IP is not a secure address, the initiation device 10 simply terminates the connection attempt. In the event the end target's 20 IP address is a secure address, the initiation device 10 holds the connection attempt, pending the establishment of a connection to the VPN server 30 in a similar manner to that described above in paragraph 17.
Specifically, the initiation device 10 first contacts the VPN server 30 through its connection to the proximal network, is authenticated and establishes a connection to the VPN server's 30 network. If this process fails, the initiation device 10 simply terminates the connection attempt. Provided it succeeds and the initiation device is connected to the VPN server's 30 network, the initiation device 10 releases the hold on the connection attempt to the end target's 20 IP address, allowing the connection to be made through the initiation device's 10 connection the VPN server's 30 network.
It is contemplated that the VPN server 30 may be set up to use any conventional VPN protocol, such as Point-to-Point Tunneling Protocol, Internet Protocol Security, and Transport Layer Security/Secure Sockets Layer.
In another embodiment, each time the initiation device connected to its proximal network is directed to connect to an end target, it holds the connection and first establishes a connection to a VPN server.
It is contemplated that in some embodiments, the initiation device may include an interface which allows a user to initiate a VPN connection manually prior to attempting to connect to a network resource. In such an embodiment, the initiation device 10 may provide options to the user to directly provide authentication credentials (such as password or passcode, finger print, facial recognition or (iris scan, etc.).
The instant invention has been shown and described herein in what is considered to be the most practical and preferred embodiment. It is recognized, however, that departures may be made therefrom within the scope of the invention and that obvious modifications will occur to a person skilled in the art.
This application claims the benefit of and incorporates by reference co-pending U.S. provisional patent application Ser. No. 62/269,883 filed Dec. 18, 2015.
Number | Date | Country | |
---|---|---|---|
62269883 | Dec 2015 | US |