×

Protecting computing devices from unauthorized access

  • US 10,140,452 B2
  • Filed: 03/29/2018
  • Issued: 11/27/2018
  • Est. Priority Date: 10/13/2006
  • Status: Active Grant
First Claim
Patent Images

1. A system comprising:

  • (a) a distributed computer network comprising multiple computing devices at multiple locations, each location comprising at least one network node;

    (b) at least one protected computing device at a first location configured for communication through said network with a storage controller to access secure data from a secure data storage repository at a second location;

    (c) said at least one protected computing device having an operating system and a virtual machine, said operating system and said virtual machine each associated with said at least one protected computing device and a virtual machine manager;

    (d) said virtual machine manager implemented in one or more computer code segments and configured to be launched between boot-up of said at least one protected computing device and launch of said operating system;

    (e) an authentication server located remotely from said at least one protected computing device and configured for authenticating said at least one protected computing device for access to said secure data;

    (f) a control console configured to access and exert a measure of control over said at least one protected computing device, wherein said control console is operable within a console device at a third location;

    (g) said virtual machine manager implemented in one or more computer code segments to be executed on said at least one protected computing device;

    (h) said virtual machine manager configured to be launched between boot-up of said protected computing device and launch of said operating system, said virtual machine manager configured to cause said authentication server to provide indicia for use in authenticating said at least one protected computing device, said virtual machine manager configured to make a decision based on said indicia from said authentication server whether to allow said at least one protected computing device to either launch or not launch said operating system based upon whether said at least one protected computing device is either authenticated or not, respectively, by said authentication server, said virtual machine manager further comprising a hypervisor configured to control the protected computing device to either launch or not launch the operating system based upon the decision.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×