US 12,470,523 B1
Systems, and methods for secure remote multi-user LAN access
Oleg Vaisband, Nesher (IL)
Assigned to MobulusNet LTD., Yokneam llit (IL)
Appl. No. 18/847,163
Filed by MOBULUSNET LTD., Yokneam Ilit (IL); and THE IP LAW FIRM OF GUY LEVI, LLC, Wyckoff, NJ (US)
PCT Filed Mar. 11, 2023, PCT No. PCT/US2023/015040
§ 371(c)(1), (2) Date Sep. 13, 2024,
PCT Pub. No. WO2023/172764, PCT Pub. Date Sep. 14, 2023.
Claims priority of provisional application 63/318,884, filed on Mar. 11, 2022.
Int. Cl. G06F 7/04 (2006.01); H04L 9/40 (2022.01)
CPC H04L 63/0272 (2013.01) [H04L 63/0442 (2013.01); H04L 63/0876 (2013.01)] 36 Claims
OG exemplary drawing
 
1. A networked system for secure communication of a plurality of remote users over wide area network, the system comprising:
a. a plurality of remote access nodes, each remote access node comprising a network edge switch with a client transceiver hardware virtual private network (HW VPN) module forming a first half of a paired HW VPN modules;
b. a modular network switch operable to accommodate a plurality of an enterprise transceiver HW VPN Modules, each enterprise transceiver HW VPN module forming a second half of the paired HW VPN modules, wherein the modular network switch is in communication with a wide-area network (WAN);
c. a secure local area network (LAN) switch, in two-way communication with each of the enterprise transceiver HW VPN module;
d. a key management server, in one-way communication with each of the enterprise transceiver HW VPN Modules via a hardware-based selector; and
e. a user workstation, in two-way communication with the secure LAN switch, the user workstation associated with the enterprise transceiver HW VPN module,
wherein, the secure LAN switch further comprises a LAN switch central processing module (CPM), with at least one processor in communication with a non-transitory memory device storing thereon processor-readable media with a set of executable instructions configured, when executed, to cause the at least one processor to:
i. receive incoming encrypted data from the WAN;
ii. upon a hardware authentication of the at least one client transceiver HW VPN module, rout the incoming data to the transceiver HW VPN module paired with the authenticated client transceiver HW VPN module;
iii. using a current encryption/decryption preshared key (PSK) associated with the transceiver HW VPN module paired with the authenticated client transceiver HW VPN module, decrypt the incoming data; and
iv. using port isolation, rout the decrypted data to the user workstation exclusively associated with the transceiver HW VPN module paired with the client transceiver HW VPN module.