Mobility Integration

Feedsee Mobility : Mobility Integration : PC card, wireless module, and mobile router integrated with VPN over cellular broadband network

IntegrationIn 2006, Verizon and Kyocera joined to bring efficient mobile computing and communications to business customers. Using Kyocera's suite of data solutions that are implemented over Verizon Wireless' Evolution-Data Optimized (EV-DO) wireless broadband network, the U.S. Navy equipped personnel with Dell laptops, Kyocera KPC650 1xEV-DO PC Cards that connected to the Verizon Wireless broadband network, and a Juniper VPN for security, so they had a secure and efficient mobile alternative to get their work done while mobile. GE Consumer and Industrial implemented a sophisticated fleet management solution designed by ServicePower that uses the Kyocera 200 Module to instantly locate vehicles over the Verizon Wireless network. The solution enabled faster, more responsive scheduling of service appointments, better on-time delivery and first time repair rates, and improved communication between field service technicians and dispatchers.

Setting up a mobile Virtual Private Network (VPN) involves a combination of various technologies to ensure secure, remote access to network resources. Here are some of the key technologies involved:

  1. IP Security (IPSec): IPSec is a suite of protocols for securing internet protocol (IP) communications by authenticating and encrypting each IP packet in a data stream. It's often used in VPNs to secure the transmission of data.
  2. Secure Sockets Layer (SSL) and Transport Layer Security (TLS): SSL and its successor, TLS, are cryptographic protocols that provide secure communications on a network, often the Internet. Many VPNs use SSL or TLS to encrypt data and authenticate the devices in the VPN.
  3. Point-to-Point Tunneling Protocol (PPTP): While PPTP is an older protocol and is considered less secure than other options, it's still used in some cases due to its compatibility with older systems and its straightforward setup process.
  4. Layer 2 Tunneling Protocol (L2TP) and L2TP/IPSec: L2TP, often combined with IPSec, provides additional security by enabling the VPN to create a tunnel through the public network and encrypt the data that passes through it.
  5. Internet Key Exchange (IKE) and IKEv2: IKE is a protocol used to set up a security association in the IPSec protocol suite. IKEv2 is an updated version of this protocol, offering improved security and performance. It's especially good for mobile VPN applications because it supports the MOBIKE protocol, allowing it to handle changes in the network connection effectively.
  6. OpenVPN: This is an open-source VPN technology that uses custom security protocols to provide a balance between security and performance. It's versatile and highly secure, making it a popular choice for VPNs.
  7. WireGuard: An increasingly popular newer VPN protocol, WireGuard aims to be faster and more efficient than IPsec and OpenVPN. It uses state-of-the-art cryptography and is recognized for its simplicity, speed, and security.
  8. Software and Apps: There are many software applications available for different operating systems (Windows, macOS, iOS, Android) to facilitate the establishment and use of VPN connections.
  9. Authentication Methods: These can include passwords, digital certificates, two-factor authentication, biometric authentication, etc., to verify the users' identities.
  10. Firewall and Network Address Translation (NAT): Firewalls protect the network from unauthorized access, while NAT allows private IP networks that use non-routable IP addresses to connect to the Internet.

These technologies work together to create a secure tunnel between the user's device and the network, protecting the data from potential eavesdroppers or hackers.