×

Securing delegated credentials in third-party networks

  • US 10,511,575 B2
  • Filed: 09/18/2017
  • Issued: 12/17/2019
  • Est. Priority Date: 09/18/2017
  • Status: Active Grant
First Claim
Patent Images

1. A method for providing an endpoint device with access to a remote resource, comprising:

  • establishing, from an intermediate device, a first secure tunnel with the endpoint device, the first secure tunnel terminating within a trusted execution environment (TEE) in a processing unit of the intermediate device, wherein the TEE performs processor-based encryption on instructions and on data used by the instructions during execution of the instructions;

    receiving, within the TEE and via the first secure tunnel, at least one credential from the endpoint device;

    transmitting the at least one credential from the intermediate device to the remote resource via a second secure tunnel, the second secure tunnel between the remote resource and the intermediate device and originating within the TEE; and

    in response to the at least one credential being accepted by the remote resource, enabling communications between the endpoint device and the remote resource via the TEE in the intermediate device through the first and second secure tunnels.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×