scispace - formally typeset
Search or ask a question
Author

Dhaval Shah

Bio: Dhaval Shah is an academic researcher from Nokia. The author has contributed to research in topics: Private network & Default gateway. The author has an hindex of 1, co-authored 1 publications receiving 26 citations.

Papers
More filters
Patent
22 Jun 2004
TL;DR: In this paper, the authors present a method and systems for securely connecting mobile nodes to an internal private network using IPsec based Virtual Private Network (VPN) technology, which employs a proxy home agent coupled to a home network associated with a mobile node that is located within a secure network, a home agent (HA) that is outside of the secure network and a VPN gateway to provide VPN services to a mobile device that changes its current address during the VPN session.
Abstract: The present invention discloses a methods and systems for securely connecting mobile nodes to an internal private network using IPsec based Virtual Private Network (VPN) technology. The system employs a proxy home agent (PHA) coupled to a home network associated with a mobile node that is located within a secure network, a home agent (HA) that is located outside of the secure network, and a VPN gateway to provide VPN services to a mobile device that changes its current address during the VPN session. The HA and PHA are configured to provide Mobile IP Home Agent functionality through a distributed system.

26 citations


Cited by
More filters
Patent
20 Mar 2002
TL;DR: In this paper, the authors propose to give precedence to intra-VPN traffic over extra-VPN on each customer's access link through access link prioritization or access link capacity allocation.
Abstract: A network architecture includes a communication network that supports one or more network-based Virtual Private Networks (VPNs). The communication network includes a plurality of boundary routers that are connected by access links to CPE edge routers belonging to the one or more VPNs. To prevent traffic from outside a customer's VPN (e.g., traffic from other VPNs or the Internet at large) from degrading the QoS provided to traffic from within the customer's VPN, the present invention gives precedence to intra-VPN traffic over extra-VPN traffic on each customer's access link through access link prioritization or access link capacity allocation, such that extra-VPN traffic cannot interfere with inter-VPN traffic. Granting precedence to intra-VPN traffic over extra-VPN traffic in this manner entails partitioning between intra-VPN and extra-VPN traffic on the physical access link using layer 2 multiplexing and configuration of routing protocols to achieve logical traffic separation between intra-VPN traffic and extra-VPN traffic at the VPN boundary routers and CPE edge routers. By configuring the access networks, the VPN boundary routers and CPE edge routers, and the routing protocols of the edge and boundary routers in this manner, the high-level service of DoS attack prevention is achieved.

177 citations

Patent
02 Jul 2004
TL;DR: In this paper, a mediating apparatus is provided on an IP network, and stores an access control list (ACL) retained in a VPN gateway unit, which is used for authentication between the VPN client unit and the VPN gateway units and for encrypted communication there.
Abstract: A mediating apparatus is provided on an IP network, and stores an access control list (ACL) retained in a VPN gateway unit. The mediating apparatus: receives a retrieval request from a VPN client unit; acquires a private IP address of a communication unit by reference to ACL; searches DNS to acquire therefrom an IP address of the VPN gateway unit; generates a common key that is used for authentication between the VPN client unit and the VPN gateway unit and for encrypted communication therebetween; sends the IP address of the VPN gateway unit, the private IP address of the communication unit, and the common key to the VPN client unit; and sends the IP address of the VPN client unit and the common key to the VPN gateway unit.

111 citations

Patent
28 Apr 2011
TL;DR: In this article, a distributed, multi-tenant Virtual Private Network (VPN) cloud system and methods for mobile security and user-based policy enforcement are presented, where plural mobile devices are configured to connect to one or more enforcement or processing nodes over VPN connections.
Abstract: The present disclosure provides distributed, multi-tenant Virtual Private Network (VPN) cloud systems and methods for mobile security and user based policy enforcement. In an exemplary embodiment, plural mobile devices are configured to connect to one or more enforcement or processing nodes over VPN connections. The enforcement or processing nodes are configured to perform content filtering, policy enforcement, and the like on some or all of the traffic from the mobile devices. The present invention is described as multi-tenant as it can connect to plural clients across different companies with different policies in a single distributed system. Advantageously, the present invention allows smartphone and tablet users to protect themselves from mobile malware, without requiring a security applications on the device. It allows administrators to seamless enforce policy for a user regardless of the device or network they are connecting to, as well as get granular visibility into the user's network behavior.

69 citations

Patent
16 Mar 2010
TL;DR: In this article, the authors propose to give precedence to intra-VPN traffic over extra-VPN on each customer's access link through access link prioritization or access link capacity allocation.
Abstract: A network architecture in accordance with the present invention includes a communication network that supports one or more network-based Virtual Private Networks (VPNs). The communication network includes a plurality of boundary routers that are connected by access links to CPE edge routers belonging to the one or more VPNs. To prevent traffic from outside a customer's VPN (e.g., traffic from other VPNs or the Internet at large) from degrading the QoS provided to traffic from within the customer's VPN, the present invention gives precedence to intra-VPN traffic over extra-VPN traffic on each customer's access link through access link prioritization or access link capacity allocation, such that extra-VPN traffic cannot interfere with inter-VPN traffic. Granting precedence to intra-VPN traffic over extra-VPN traffic in this manner entails special configuration of network elements and protocols, including partitioning between intra-VPN and extra-VPN traffic on the physical access link using layer 2 multiplexing and the configuration of routing protocols to achieve logical traffic separation between intra-VPN traffic and extra-VPN traffic at the VPN boundary routers and CPE edge routers. By configuring the access networks, the VPN boundary routers and CPE edge routers, and the routing protocols of the edge and boundary routers in this manner, the high-level service of DoS attack prevention is achieved.

56 citations

Patent
25 Feb 2005
TL;DR: In this article, the authors proposed a scheme to arrange data transmission for a mobile node in a telecommunications system comprising a secure network and an insecure network, where the VPN node and the home agent are configured to allocate the same IP address as an internal IP address and as a home address.
Abstract: The present invention relates to arranging data transmission for a mobile node in a telecommunications system comprising a secure network and an insecure network. A connection to a secure network for a mobile node may be arranged by a home agent if the mobile node is accessing the secure network directly or via a third network other than the insecure network, or a connection to the secure network may be arranged by a VPN node if the mobile node is accessing the secure network via the insecure network. According to a first aspect of the invention, the VPN node and the home agent are configured to allocate the same IP address as an internal IP address and as a home address.

50 citations