Patent attributes
A method including configuring a VPN server to predict or determine potential overloading of the VPN server based on predicting or determining a breach of a critical threshold; configuring the VPN server to verify, based on predicting or determining the potential overloading, an identity of a secondary server with which the VPN server is authorized to establish a secure connection; configuring the VPN server to establish, based on verifying the identity of the secondary server, a secure connection with the secondary server to enable communication of encrypted information between the VPN server and the secondary server; and configuring the VPN server to transmit, to the secondary server, an encrypted message identifying a host device and data of interest to be retrieved from the host device to enable the secondary server to request the data of interest from the host device is disclosed. Various other aspects are contemplated.