Sign In to Follow Application
View All Documents & Correspondence

A Configurable System For Facilitating Secure Wide Area Network Access And A Method Thereof

Abstract: A configurable system (100) for facilitating secure wide area network access is disclosed. The configurable system includes an industrial router (120) configured to provide a secure wide area network connectivity to a user, wherein the industrial router facilitates a plurality of virtual private network tunnels (125) with automatic failover. The processing subsystem includes a monitoring module (130) receives a status update of the industrial router on a network management system. The analysis module (140) evaluates performance of the industrial router and enacts measures using machine learning to maintain a predefined level of uptime. A backhaul module (150) facilitates uninterrupted data transmission within the network, wherein the backhaul module includes at least two virtual private network concentrators in high availability mode, wherein each of the virtual private network concentrators includes at least two internet leased line. FIG. 1

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
24 January 2024
Publication Number
36/2024
Publication Type
INA
Invention Field
COMMUNICATION
Status
Email
Parent Application
Patent Number
Legal Status
Grant Date
2025-10-06
Renewal Date

Applicants

ADVANTAGESB COMMUNICATIONS PRIVATE LIMITED
OFFICE NO. 1605, 16TH FLOOR, RUPA SOLITAIRE, MILLENNIUM BUSINESS PARK MBP, MAHAPE, NAVI MUMBAI- 400710, MAHARASHTRA, INDIA

Inventors

1. SUDIPTO BANERJI
B-1302, SATYAM IMPERIAL HEIGHTS, SECTOR 11, GHANSOLI, NAVI MUMBAI, MAHARASHTRA, INDIA, 400701

Specification

DESC:EARLIEST PRIORITY DATE:
This Application claims priority from a provisional patent application filed in India having Patent Application No. 202421005044, filed on January 24, 2024, and titled “SECURAWAN (SECURED ACCESS WIDE AREA NETWORK)”.
FIELD OF INVENTION
[0001] Embodiments of the present disclosure relate to the field of wide area network access, and more particularly, a configurable system for facilitating secure wide area network access and a method thereof.
BACKGROUND
[0002] A Wide Area Network (WAN) is a telecommunications network that connects large geographic areas, allowing an enterprise to connect multiple locations, facilitate information exchange, manage resources, and coordinate operations over long distances. In addition, the WAN is necessary for secure connections such as automated teller machines, gas pumps, and electric vehicle charging stations. Traditionally, in such applications, solutions such as Multiprotocol Label Switching (MPLS) networks provide reliable and secure data routing. However, building subscriber identity module (SIM)-based MPLS networks and very small aperture terminal (VSAT) connectivity has specific limitations and disadvantages. Further, a single carrier is utilized at back end remote areas of the MPLS network creating a single point of failure; if the carrier experiences an outage or technical issues at both, the backend and remote areas will lose connectivity, leading to significant downtime. In addition, maintaining a seamless connection between the mobile network operator’s hub and the enterprise data center or disaster recovery site requires establishing a point-to-point (P2P) connection, which is complex and expensive. Further, constant coordination with the mobile network operator provider to maintain and resolve these connections increases operational challenges and costs.
[0003] Further, the VSAT connectivity, is sensitive to weather conditions, which can result in increased latency, reduced bandwidth, and potential interruptions in service. This can cause serious issues for critical applications such as financial transactions at ATMs and real-time data transmission at the electric vehicle charging stations. Setting up and maintaining the VSAT infrastructure is expensive and requires continuous monitoring to control weather-related impacts adds to operational overheads.
[0004] Hence, there is a need for an improved system for secure wide area network which addresses the aforementioned issue(s).
OBJECTIVE OF THE INVENTION
[0005] An objective of the invention is to utilize an industrial router to provide a secure wide area network connectivity to a user and to facilitate a plurality of virtual private network tunnels with automatic failovers. The plurality of virtual private network tunnels is customized remotely based on the user requirement.
BRIEF DESCRIPTION
[0006] In accordance with an embodiment of the present disclosure, a configurable system for facilitating secure wide area network access. The configurable system includes an industrial router configured to provide a secure wide area network connectivity to a user, wherein the industrial router facilitates a plurality of virtual private network tunnels with automatic failover, wherein the plurality of virtual private network tunnels is customized remotely based on a user requirement, wherein the industrial router provides at least four internet protocol address to the plurality of virtual private network tunnel. The configurable system includes a processing subsystem connected to a server. The processing subsystem is configured to execute on a network to control bidirectional communications among a plurality of modules. The processing subsystem includes a monitoring module operatively coupled to the industrial router wherein the monitoring module is configured to receive a status update of the industrial router on a network management system. Further, the processing subsystem includes an analysis module operatively coupled to the monitoring module wherein the analysis module is configured to evaluate performance of the industrial router and enact measures using machine learning to maintain a predefined level of uptime. Furthermore, the processing subsystem includes a backhaul module operatively coupled to the analysis module wherein the backhaul module is configured to facilitate uninterrupted data transmission within the network, wherein the backhaul module includes at least two virtual private network concentrators in high availability mode, wherein each of the virtual private network concentrators includes at least two internet leased line, wherein the plurality of virtual private network concentrators utilizes a common internet protocol address, wherein the said backhaul module is replicated in a disaster recovery server thereby a data center server and the disaster recovery server operates simultaneously to facilitate uninterrupted data transmission within the network.
[0007] In accordance with another embodiment of the present disclosure, a method for facilitating secure wide area network access is provided. The method includes providing, by an industrial router, a secure wide area network connectivity to a user, wherein the industrial router facilitates a plurality of virtual private network tunnels with automatic failover, wherein the plurality of virtual private network tunnels is customized remotely based on a user requirement, wherein the industrial router provides at least four internet protocol address to the plurality of virtual private network tunnel. Further, the method includes receiving, by a monitoring module, a status update of the industrial router on a network management system. Furthermore, the method includes evaluating, by an analysis module, performance of the industrial router and enact measures using machine learning to maintain a predefined level of uptime. Moreover, the method includes facilitating, by a backhaul module, uninterrupted data transmission within the network, wherein the backhaul module includes at least two virtual private network concentrators in high availability mode, wherein each of the virtual private network concentrators includes at least two internet leased line, wherein the plurality of virtual private network concentrators utilizes a common internet protocol address, wherein the said backhaul module is replicated in the disaster recovery server thereby the data center server and the disaster recovery server operates simultaneously to facilitate uninterrupted data transmission within the network.
[0008] To further clarify the advantages and features of the present disclosure, a more particular description of the disclosure will follow by reference to specific embodiments thereof, which are illustrated in the appended figures. It is to be appreciated that these figures depict only typical embodiments of the disclosure and are therefore not to be considered limiting in scope. The disclosure will be described and explained with additional specificity and detail with the appended figures.
BRIEF DESCRIPTION OF THE DRAWINGS
[0009] The disclosure will be described and explained with additional specificity and detail with the accompanying figures in which:
[0010] FIG. 1 is a block diagram representation of a configurable system for facilitating secure wide area network access in accordance with an embodiment of the present disclosure;
[0011] FIG. 2 is a block diagram representation of an exemplary embodiment of a configurable system for facilitating secure wide area network access of FIG. 1 in accordance with an embodiment of the present disclosure;
[0012] FIG. 3 is a block diagram of a computer or a server in accordance with an embodiment of the present disclosure;
[0013] FIG. 4(a) illustrates a flow chart representing the steps involved in a method for facilitating secure wide area network access in accordance with an embodiment of the present disclosure; and
[0014] FIG. 4(b) illustrates continued steps of the method of FIG. 4(a) in accordance with an embodiment of the present disclosure.
[0015] Further, those skilled in the art will appreciate that elements in the figures are illustrated for simplicity and may not have necessarily been drawn to scale. Furthermore, in terms of the construction of the device, one or more components of the device may have been represented in the figures by conventional symbols, and the figures may show only those specific details that are pertinent to understanding the embodiments of the present disclosure so as not to obscure the figures with details that will be readily apparent to those skilled in the art having the benefit of the description herein.
DETAILED DESCRIPTION
[0016] For the purpose of promoting an understanding of the principles of the disclosure, reference will now be made to the embodiment illustrated in the figures and specific language will be used to describe them. It will nevertheless be understood that no limitation of the scope of the disclosure is thereby intended. Such alterations and further modifications in the illustrated system, and such further applications of the principles of the disclosure as would normally occur to those skilled in the art are to be construed as being within the scope of the present disclosure.
[0017] The terms “comprises”, “comprising”, or any other variations thereof, are intended to cover a non-exclusive inclusion, such that a process or method that comprises a list of steps does not include only those steps but may include other steps not expressly listed or inherent to such a process or method. Similarly, one or more devices or subsystems or elements or structures or components preceded by "comprises... a" does not, without more constraints, preclude the existence of other devices, sub-systems, elements, structures, components, additional devices, additional sub-systems, additional elements, additional structures or additional components. Appearances of the phrase "in an embodiment", "in another embodiment" and similar language throughout this specification may, but not necessarily do, all refer to the same embodiment.
[0018] Unless otherwise defined, all technical and scientific terms used herein have the same meaning as commonly understood by those skilled in the art to which this disclosure belongs. The system, methods, and examples provided herein are only illustrative and not intended to be limiting.
[0019] In the following specification and the claims, reference will be made to a number of terms, which shall be defined to have the following meanings. The singular forms “a”, “an”, and “the” include plural references unless the context clearly dictates otherwise.
[0020] Embodiments of the present disclosure relates to system for facilitating secure wide area network access. The processing subsystem is configured to execute on a network to control bidirectional communications among a plurality of modules. The processing subsystem includes a monitoring module operatively coupled to the industrial router wherein the monitoring module is configured to receive a status update of the industrial router on a network management system. Further, the processing subsystem includes an analysis module operatively coupled to the monitoring module wherein the analysis module is configured to evaluate performance of the industrial router and enact measures using machine learning to maintain a predefined level of uptime. Furthermore, the processing subsystem includes a backhaul module operatively coupled to the analysis module wherein the backhaul module is configured to facilitate uninterrupted data transmission within the network, wherein the backhaul module includes at least two virtual private network concentrators in high availability mode, wherein each of the virtual private network concentrators includes at least two internet leased line, wherein the plurality of virtual private network concentrators utilizes a common internet protocol address, wherein the said backhaul module (150) is replicated in a disaster recovery server thereby a data center server and the disaster recovery server operates simultaneously to facilitate uninterrupted data transmission within the network.
[0021] FIG. 1 is a block diagram representation of a configurable system (100) for facilitating secure wide area network access in accordance with an embodiment of the present disclosure. The configurable system (100) includes an industrial router (120) and a processing subsystem (105) connected to a server (108). In one embodiment, the server (108) may include a cloud-based server. In another embodiment, parts of the server (108) may be a local server coupled to a user device (not shown in FIG.1). The processing subsystem (105) is configured to execute on a network (115) to control bidirectional communications among a plurality of modules. In one example, the network (115) may be a private or public local area network (LAN) or Wide Area Network (WAN), such as the Internet. In another embodiment, the network (115) may include both wired and wireless communications according to one or more standards and/or via one or more transport mediums. In one example, the network (115) may include wireless communications according to one of the 802.11 or Bluetooth specification sets, or another standard or proprietary wireless communication protocol. In yet another embodiment, the network (115) may also include communications over a terrestrial cellular network, including, a global system for mobile communications (GSM), code division multiple access (CDMA), and/or enhanced data for global evolution (EDGE) network. The processing subsystem (105) includes a monitoring module (130), an analysis module (140), and a backhaul module (150).
[0022] In a specific embodiment, the industrial router (120) is an Adv50 Router and family of routers from advanced technology solutions private limited (ATSPL).
[0023] The industrial router (120) is configured to provide a secure wide area network connectivity to a user. The industrial router (120) facilitates a plurality of virtual private network tunnels (125) with automatic failovers. Typically, the industrial router (120) is a durable, robust networking device designed for use in industrial environments, able to withstand harsh conditions like extreme temperatures, dust, moisture, and vibrations, providing reliable and secure network connectivity for communication between various industrial devices and systems. Further, the industrial router (120) is capable of managing the plurality of virtual private network tunnels (125). Typically, the plurality of VPN tunnel (125) is a secure connection between two points over a public network, such as the internet, that encrypts data being transmitted, ensuring privacy and protection from unauthorized access. Further, the VPN tunnels (125) are crucial for enterprises with multiple offices to securely connect remote offices to a main office's network. Further, the industrial router (120) at each end of the VPN tunnels (125), the industrial router (120) or the VPN gateway creates and manages the VPN tunnels (125) to the main office’s network, encrypting the outgoing data before sending it through the VPN tunnels (125) to the main office's router. This ensures that sensitive data, such as internal communications, financial transactions, or confidential documents, is securely shared between the office’s network without risk of interception or tampering. Furthermore, the plurality of virtual private network tunnels (125) is customized remotely based on the user requirement. Typically, the industrial router (120) can be customized by setting up security protocols, defining routes and access controls, and adjusting bandwidth and priority settings for different data traffic types.
[0024] It is to be noted that, each of the plurality of VPN tunnel (125) may connect to different network.
[0025] Moreover, the industrial router (120) provides at least four internet protocol addresses to the plurality of virtual private network tunnels (125). Typically, the internet protocol address is a unique numerical identifier assigned to each device connected to the network, allowing the device to communicate over the network. The industrial router (120) assigns distinct IP addresses to the plurality of virtual private network (VPN) tunnels to manage traffic and ensure secure communication. For example, the industrial router (120) connecting to a central office with multiple remote sites might assign one IP address to the VPN tunnel (125) connecting the central office to a manufacturing plant and another to the VPN tunnel (125) connecting to a remote office. Further, the industrial router (120) utilizes internet protocol security (IPsec) apply 256 Bit encryption and hash technique on the data packets thereby ensuring secure communication on the data packets within the network (115). Typically, IPsec is a set of protocols that secures Internet Protocol (IP) communications through encryption and authentication. Further, the industrial router (120) utilizes 256-bit encryption on the data packets, converting the data packets into a format that can be only accessible to authorized parties with the correct decryption key.
[0026] Typically, the plurality of virtual private network tunnels (125) switches by utilizing an artificial intelligence technique in response to an occurrence of failure at least one of the plurality of virtual private network tunnels (125). Typically, the AI technique monitors performance metrics of the VPN tunnel (125) continuously. The performance metrics includes, but are not limited to latency, packet loss, and throughput. For example, if the VPN tunnel (125) fails, the AI technique reroutes traffic through alternative tunnels based on a real-time network conditions and historical data.
[0027] The monitoring module (130) is operatively coupled to the industrial router (120). The monitoring module (130) is configured to receive a status update of the industrial router (120) on a network management system. Typically, the network management system (NMS) is a platform that manages, monitors, and maintains health and performance of the industrial router (120), thereby allowing the network administrators to manage the industrial router (120) proactively, ensuring efficient and reliable functioning within the network. Typically, the monitoring module (130) monitors the network (115) by utilizing a network management protocol version. Typically, the network management protocol versions are standardized protocols used to manage and monitor the network devices, ensuring efficient operation, fault detection, and performance management.
[0028] Furthermore, the analysis module (140) is operatively coupled to the monitoring module (130). The analysis module (140) is configured to evaluate performance of the industrial router (120) and enact measures using machine learning technique to maintain a predefined level of uptime. Typically, the machine learning technique analyses data patterns, identifies potential issues, and predicts future performance trends of the industrial router (120). Further, the machine learning technique utilizes insights to implement corrective actions to maintain operations of the industrial router (120) at a predefined level of uptime, thereby minimizing downtime, enhancing reliability, and optimizing the network performance through the machine learning technique.
[0029] Further, the monitoring module (130) utilizes dual subscriber identity fourth generation connectivity with point-point protocol support thereby ensuring avoidance of internet protocol conflict. Typically, the monitoring module (130) utilizes two 4G connections simultaneously, ensuring redundancy and reliability.
[0030] Moreover, the backhaul module (150) is operatively coupled to the analysis module (140). The backhaul module (150) is configured to facilitate uninterrupted data transmission within the network (115). The backhaul module (150) includes at least two virtual private network concentrators in high availability mode. Typically, the VPN concentrators are advanced devices or software that manage VPN connections, ensuring secure internet communication for the remote users or sites. The VPN connectors are in high availability mode ensuring continuity and minimal downtime by automatically handling hardware or software failures. Further, each of the virtual private network concentrators includes at least two internet leased lines ensuring consistent and reliable connectivity. The plurality of virtual private network concentrators utilizes a common internet protocol address. The said backhaul module (150) is replicated in a disaster recovery server thereby a data center server and the disaster recovery server operate simultaneously to facilitate uninterrupted data transmission within the network. Typically, the data center server manages and stores critical business data, applications, and services, providing reliable access. The disaster recovery server is a backup server at a different site, designed to take over if the data center server fails due to natural disasters, cyber-attacks, or hardware malfunctions.
[0031] FIG. 2 is a block diagram representation of an exemplary embodiment of a configurable system for facilitating secure wide area network access of FIG. 1 in accordance with an embodiment of the present disclosure. The block diagram illustrates a solution connecting various services through a 4G LTE network. For example, consider a multinational company with multiple branches in multiple locations. Each branch has ATMs (400) for financial transactions, closed circuit television (405) and wireless fidelity (Wi-Fi) (410) for internal use. These branches are considered remote sites in FIG. 2. Further, feed from the CCTV camera (405), Network Management System (NMS) (415), and data from the multinational company are transmitted through the network 4G LTR or 5G Machine-to-Machine (M2M) SIM cards to central data center (420) (referred to as user data center of the multinational company). Furthermore, firewall protection (430), helpdesk services (435), and NMS (415) for monitoring and managing the network are provided by an advantageous data center. Moreover, the data transmission between the user data center (420) and the advantage's data center (440) occurs via the plurality of virtual private network tunnels (125), ensuring secure communication. Further, the data from the remote site (445) and the user data center (420) is managed by the industrial router (120).
[0032] FIG. 3 is a block diagram of a computer or a server in accordance with an embodiment of the present disclosure. The server (200) includes processor(s) (230), and memory (210) operatively coupled to the bus (220). The processor(s) (230), as used herein, means any type of computational circuit, such as, but not limited to, a microprocessor, a microcontroller, a complex instruction set computing microprocessor, a reduced instruction set computing microprocessor, a very long instruction word microprocessor, an explicitly parallel instruction computing microprocessor, a digital signal processor, or any other type of processing circuit, or a combination thereof.
[0033] The memory (210) includes several subsystems stored in the form of executable program which instructs the processor (230) to perform the method steps illustrated in FIG. 1. The memory (210) includes a processing subsystem (105) of FIG.1. The processing subsystem (105) further has following modules a monitoring module (130), analysis module (140), and a backhaul module (150).
[0034] The monitoring module (130) is configured to receive a status update of the industrial router (120) on a network management system. Further, the processing subsystem (105) includes an analysis module (140) operatively coupled to the monitoring module (130) wherein the analysis module (140) is configured to evaluate performance of the industrial router (120) and enact measures using machine learning to maintain a predefined level of uptime. Furthermore, the processing subsystem (105) includes a backhaul module (150) operatively coupled to the analysis module (140) wherein the backhaul module (150) is configured to facilitate uninterrupted data transmission within the network, wherein the backhaul module (150) includes at least two virtual private network concentrators in high availability mode, wherein each of the virtual private network concentrators includes at least two internet leased line, wherein the plurality of virtual private network concentrators utilizes a common internet protocol address, wherein the said backhaul module (150) is replicated in a disaster recovery server thereby a data center server and the disaster recovery server operates simultaneously to facilitate uninterrupted data transmission within the network.
[0035] The bus (220) as used herein refers to internal memory channels or computer network that is used to connect computer components and transfer data between them. The bus (220) includes a serial bus or a parallel bus, wherein the serial bus transmits data in bit-serial format and the parallel bus transmits data across multiple wires. The bus (220) as used herein, may include but not limited to, a system bus, an internal bus, an external bus, an expansion bus, a frontside bus, a backside bus, and the like.
[0036] FIG. 4 illustrates a flow chart representing the steps involved in a method (300) for facilitating secure wide area network access with an embodiment of the present disclosure. The method (300) includes providing, by an industrial router, a secure wide area network connectivity to a user, wherein the industrial router facilitates a plurality of virtual private network tunnels with automatic failover, wherein the plurality of virtual private network tunnels is customized remotely based on a user requirement, wherein the industrial router provides at least four internet protocol address to the plurality of virtual private network tunnel in step 310.
[0037] In one embodiment, the plurality of virtual private network tunnels (125) switches by utilizing an artificial intelligence technique in response to an occurrence of failure at least one of the plurality of virtual private network tunnels.
[0038] In one embodiment, the industrial router (120) is connected to the data center server (108) and the data recovery server (110).
[0039] In another embodiment, the industrial router (120) utilizes internet protocol security to apply 256 Bit encryption and hash technique on the data packets thereby ensuring secure communication on the data packets within the network (115).
[0040] Further, the method (300) includes receiving, by a monitoring module, a status update of the industrial router on a network management system in step 320.
[0041] In one embodiment, the monitoring module (130) monitors the network (115) by utilizing a network management protocol version.
[0042] In another embodiment, the monitoring module (130) utilizes dual subscriber identity fourth generation connectivity and fifth generation connectivity with point-point protocol support thereby ensuring avoidance of internet protocol conflict.
[0043] Furthermore, the method (300) also includes evaluating, by an analysis module, performance of the industrial router and enact measures using machine learning to maintain a predefined level of uptime in step 330.
[0044] Moreover, the method (300) includes facilitating, by a backhaul module, uninterrupted data transmission within the network, wherein the backhaul module includes at least two virtual private network concentrators in high availability mode, wherein each of the virtual private network concentrators includes at least two internet leased line, wherein the plurality of virtual private network concentrators utilizes a common internet protocol address, wherein the said backhaul module is replicated in the disaster recovery server thereby the data center server and the disaster recovery server operates simultaneously to facilitate uninterrupted data transmission within the network in step 340.
[0045] In one embodiment, the industrial router (120) functions as Internet of Things gateway with a recommended standard 232 and recommended standard 485 port.
[0046] Various embodiments of a configurable system (100) for facilitating secure wide area network as described above provides various benefits. The industrial router (120) provides robust connectivity with the plurality of virtual private network (VPN) tunnels, featuring automatic failover. Further, the industrial router (120) provides remote customization based on user requirements thereby ensuring seamless network operation by offering at least two IP addresses to the plurality of VPN tunnels (125). Further, the NMS provides real-time status and the metrics of the industrial router (120) to a user through the machine learning techniques for optimal uptime, while the backhaul module's replication in a disaster recovery server ensures uninterrupted data transmission. Furthermore, the industrial router (120) deployed at the user location is in the high availability mode thereby ensuring high availability of internet connectivity without interruptions. Moreover, the industrial router (120) is capable of withstanding extreme weather conditions, including both high temperature and low temperature.
[0047] Further, the configurable system (100) disclosed herein can be used as a plug and play solution.
[0048] The techniques described in this disclosure may be implemented, at least in part, in hardware, software, firmware, or any combination thereof. For example, various aspects of the described techniques may be implemented within one or more processors, including one or more microprocessors, digital signal processors (DSPs), application-specific integrated circuits (ASICs), field-programmable gate arrays (FPGAs), or any other equivalent integrated or discrete logic circuitry, as well as any combinations of such components. The term “processor” or “processing subsystem” may generally refer to any of the foregoing logic circuitry, alone or in combination with other logic circuitry, or any other equivalent circuitry. A control unit including hardware may also perform one or more of the techniques of this disclosure.
[0049] Such hardware, software, and firmware may be implemented within the same device or within separate devices to support the various techniques described in this disclosure. In addition, any of the described units, modules, or components may be implemented together or separately as discrete but interoperable logic devices. Depiction of different features as modules or units is intended to highlight different functional aspects and does not necessarily imply that such modules or units must be realized by separate hardware, firmware, or software components. Rather, functionality associated with one or more modules or units may be performed by separate hardware, firmware, or software components, or integrated within common or separate hardware, firmware, or software components.
[0050] It will be understood by those skilled in the art that the foregoing general description and the following detailed description are exemplary and explanatory of the disclosure and are not intended to be restrictive thereof.
[0051] While specific language has been used to describe the disclosure, any limitations arising on account of the same are not intended. As would be apparent to a person skilled in the art, various working modifications may be made to the method in order to implement the inventive concept as taught herein.
[0052] The figures and the foregoing description give examples of embodiments. Those skilled in the art will appreciate that one or more of the described elements may well be combined into a single functional element. Alternatively, certain elements may be split into multiple functional elements. Elements from one embodiment may be added to another embodiment. For example, the order of processes described herein may be changed and are not limited to the manner described herein. Moreover, the actions of any flow diagram need not be implemented in the order shown; nor do all of the acts need to be necessarily performed. Also, those acts that are not dependent on other acts may be performed in parallel with the other acts. The scope of embodiments is by no means limited by these specific examples.
,CLAIMS:1. A configurable system (100) for facilitating secure wide area network access comprising:
characterized in that,
an industrial router (120) configured to provide a secure wide area network connectivity to a user;
wherein the industrial router (120) facilitates a plurality of virtual private network tunnels (125) with automatic failover, wherein the plurality of virtual private network tunnels (125) is customized remotely based on a user requirement,
wherein the industrial router (120) provides at least four internet protocol address to the plurality of virtual private network tunnels (125);
a processing subsystem (105) connected to a server (108) wherein the processing subsystem (105) is configured to execute on a network (115) to control bidirectional communications among a plurality of modules comprising:
a monitoring module (130) operatively coupled to the industrial router (120) wherein the monitoring module (130) is configured to receive a status update of the industrial router (120) on a network management system;
an analysis module (140) operatively coupled to the monitoring module (130) wherein the analysis module (140) is configured to evaluate performance of the industrial router (120) and enact measures using machine learning to maintain a predefined level of uptime; and
a backhaul module (150) operatively coupled to the analysis module (140) wherein the backhaul module (150) is configured to facilitate uninterrupted data transmission within the network (115), wherein the backhaul module (150) comprises at least two virtual private network concentrators in high availability mode,
wherein each of the virtual private network concentrators comprises at least two internet leased line,
wherein the plurality of virtual private network concentrators utilizes a common internet protocol address,
wherein the said backhaul module (150) is replicated in a disaster recovery server thereby a data center server and the disaster recovery server operates simultaneously to facilitate uninterrupted data transmission within the network.

2. The configurable system (100) as claimed in claim 1, wherein the industrial router (120) is connected to the data center server (108) and the data recovery server (110).

3. The configurable system (100) as claimed in claim 1, wherein the industrial router (120) utilizes internet protocol security to apply 256 Bit encryption and hash technique on the data packets thereby ensuring secure communication on the data packets within the network (115).

4. The configurable system (100) as claimed in claim 1, wherein the monitoring module (130) monitors the network (115) by utilizing a network management protocol version.

5. The configurable system (100) as claimed in claim 1, wherein the plurality of virtual private network tunnels (125) switches by utilizing an artificial intelligence technique in response to an occurrence of failure at least one of the plurality of virtual private network tunnels (125).

6. The configurable system (100) as claimed in claim 1, wherein the monitoring module (130) utilizes dual subscriber identity fourth generation connectivity and fifth generation connectivity with point-point protocol support thereby ensuring avoidance of internet protocol conflict.

7. The configurable system (100) as claimed in claim 1, wherein the industrial router (120) functions as Internet of Things gateway with a recommended standard 232 and recommended standard 485 port.

8. A method (300) for facilitating secure wide area network access comprising:
characterized in that,
providing, by an industrial router, a secure wide area network connectivity to a user, wherein the industrial router facilitates a plurality of virtual private network tunnels with automatic failover, wherein the plurality of virtual private network tunnels is customized remotely based on a user requirement, wherein the industrial router provides at least four internet protocol address to the plurality of virtual private network tunnel; (310)
receiving, by a monitoring module, a status update of the industrial router on a network management system; (320)
evaluating, by an analysis module, performance of the industrial router (120) and enact measures using machine learning to maintain a predefined level of uptime; (330) and
facilitating, by a backhaul module, uninterrupted data transmission within the network, wherein the backhaul module comprises at least two virtual private network concentrators in high availability mode, wherein each of the virtual private network concentrators comprises at least two internet leased line, wherein the plurality of virtual private network concentrators utilizes a common internet protocol address, wherein the said backhaul module is replicated in the disaster recovery server thereby the data center server and the disaster recovery server operates simultaneously to facilitate uninterrupted data transmission within the network. (340)
Dated this 10th day of July 2024

Signature

Jinsu Abraham
Patent Agent (IN/PA-3267)
Agent for the Applicant

Documents

Application Documents

# Name Date
1 202421005044-STATEMENT OF UNDERTAKING (FORM 3) [24-01-2024(online)].pdf 2024-01-24
2 202421005044-PROVISIONAL SPECIFICATION [24-01-2024(online)].pdf 2024-01-24
3 202421005044-PROOF OF RIGHT [24-01-2024(online)].pdf 2024-01-24
4 202421005044-POWER OF AUTHORITY [24-01-2024(online)].pdf 2024-01-24
5 202421005044-FORM FOR STARTUP [24-01-2024(online)].pdf 2024-01-24
6 202421005044-FORM FOR SMALL ENTITY(FORM-28) [24-01-2024(online)].pdf 2024-01-24
7 202421005044-FORM 1 [24-01-2024(online)].pdf 2024-01-24
8 202421005044-EVIDENCE FOR REGISTRATION UNDER SSI(FORM-28) [24-01-2024(online)].pdf 2024-01-24
9 202421005044-EVIDENCE FOR REGISTRATION UNDER SSI [24-01-2024(online)].pdf 2024-01-24
10 202421005044-FORM-26 [28-02-2024(online)].pdf 2024-02-28
11 202421005044-FORM-9 [11-07-2024(online)].pdf 2024-07-11
12 202421005044-DRAWING [11-07-2024(online)].pdf 2024-07-11
13 202421005044-CORRESPONDENCE-OTHERS [11-07-2024(online)].pdf 2024-07-11
14 202421005044-COMPLETE SPECIFICATION [11-07-2024(online)].pdf 2024-07-11
15 202421005044-STARTUP [02-08-2024(online)].pdf 2024-08-02
16 202421005044-FORM28 [02-08-2024(online)].pdf 2024-08-02
17 202421005044-FORM 18A [02-08-2024(online)].pdf 2024-08-02
18 Abstract.jpg 2024-08-30
19 202421005044-FER.pdf 2024-09-24
20 202421005044-FORM 3 [03-10-2024(online)].pdf 2024-10-03
21 202421005044-OTHERS [26-11-2024(online)].pdf 2024-11-26
22 202421005044-FORM-26 [26-11-2024(online)].pdf 2024-11-26
23 202421005044-FER_SER_REPLY [26-11-2024(online)].pdf 2024-11-26
24 202421005044-US(14)-HearingNotice-(HearingDate-20-12-2024).pdf 2024-12-02
25 202421005044-FORM-26 [10-12-2024(online)].pdf 2024-12-10
26 202421005044-Correspondence to notify the Controller [10-12-2024(online)].pdf 2024-12-10
27 202421005044-Written submissions and relevant documents [02-01-2025(online)].pdf 2025-01-02
28 202421005044-FORM-8 [02-04-2025(online)].pdf 2025-04-02
29 202421005044-PatentCertificate06-10-2025.pdf 2025-10-06
30 202421005044-IntimationOfGrant06-10-2025.pdf 2025-10-06

Search Strategy

1 202421005044E_24-09-2024.pdf

ERegister / Renewals