CPC H04L 47/825 (2013.01) [G06F 9/4401 (2013.01); G06F 9/4416 (2013.01); G06F 21/575 (2013.01); H04L 9/08 (2013.01); H04L 12/4633 (2013.01); H04L 12/465 (2013.01); H04L 45/22 (2013.01); H04L 45/28 (2013.01); H04L 45/302 (2013.01); H04L 45/64 (2013.01); H04L 47/83 (2022.05); H04L 63/02 (2013.01); H04L 63/0218 (2013.01); H04L 63/0236 (2013.01); H04L 63/0254 (2013.01); H04L 63/0263 (2013.01); H04L 63/0272 (2013.01); H04L 12/4641 (2013.01)] | 18 Claims |
1. A network system for connecting devices via a virtual overlay network spanning a plurality of geographical regions, comprising:
an endpoint device comprising a first virtual overlay network connectivity manager, at least one tunnel manager, a first virtual interface, and a second virtual interface;
a first access point server comprising a second virtual overlay network connectivity manager, and at least one second tunnel manager, the first access point server providing access to a first geographical region via the virtual overlay network;
a second access point server comprising a third virtual overlay network connectivity manager, and at least one third tunnel manager, the second access point server providing access to a second geographical region via the virtual overlay network;
wherein each of the first, second, and third virtual overlay network connectivity managers are configured to receive, from a control server, respective peering information and credentials;
wherein the endpoint device and the first access point server are configured to, based at least in part on their respective peering information and credentials, establish at least one secure first tunnel between the endpoint device and the first access point server;
wherein the endpoint device and the second access point server are configured to, based at least in part on their respective peering information and credentials, establish at least one secure second tunnel between the endpoint device and the second access point server;
wherein the first virtual interface provides the endpoint device a logical point of access to the first geographical region, through the at least one secure first tunnel; and
wherein the second virtual interface provides the endpoint device a logical point of access to the second geographical region, through the at least one secure second tunnel.
|