Methods and systems are provided for any individual with access to a network to create, operate and thereafter dismantle a personal
private network (PPN) which is secure across all forms of media which facilitate
digital data transfer, including but not limited to, both
wireless and
wireline based networks. In one embodiment, utilizing browser-based management objects and a PPN
client server the present invention provides for any individual with access to
the Internet or other types of networks to create, control and utilize his own PPN with any one or a plurality of authorized participants. This invention facilities this capability with the creation of secure pipelines between each authorized participant of the PPN, where, if necessary, to establish these secure pipelines, a tunnel under, around or through border servers and / or firewalls is created. Each PPN provides the authorized participants with complete freedom to communicate, to review information and to transfer data between participants with full and complete
encryption security. The creation, operation and the dismantlement of a PPN is totally within the capabilities and control of the originating party, the source
client, and requires no actions from any network or
system administrators. Additionally, all of the PPN secure pipeline creation and infrastructure mapping for the enablement of the PPN, plus access controls and codes for authorizing participation and initiating participation and disconnection can be encased in a PPN secure
access key.