Remote access
First Claim
Patent Images
1. A method for remote access, comprising:
- requesting access to a first device of a private network from a second device remote to the private network, the private network including an internal node inside of a firewall of the private network;
processing the access request at an access hub remote to the private network;
using the internal node to open an encrypted connection through the firewall to a connection manager outside of the private network based on the access request;
providing access information from the access hub to the second device based on the access request; and
establishing a communication session in which communications between the second device and the first device are forwarded through the connection manager and the internal node by using the encrypted connection.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods, and devices are provided for remote access. One method includes requesting access to a first device from a second device remote to the first device. The method includes processing the access request at an access hub remote to the first device. An internal node is used to open an encrypted connection to a connection manager based on the access request. Access information is provided from the access hub to the second device based on the access request. A communication session is established in which communications between the second device and the first device are forwarded through the connection manager and the internal node by using the encrypted connection.
214 Citations
46 Claims
-
1. A method for remote access, comprising:
-
requesting access to a first device of a private network from a second device remote to the private network, the private network including an internal node inside of a firewall of the private network;
processing the access request at an access hub remote to the private network;
using the internal node to open an encrypted connection through the firewall to a connection manager outside of the private network based on the access request;
providing access information from the access hub to the second device based on the access request; and
establishing a communication session in which communications between the second device and the first device are forwarded through the connection manager and the internal node by using the encrypted connection. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method for remote access, comprising:
-
requesting access to a private network from a computing device remote to the private network, the private network including an internal node inside of a firewall of the private network;
processing the access request at an access hub remote to the private network, using the internal node to open an encrypted connection through the firewall to a connection manager outside of the private network based on the access request, wherein the connection manager hosts a web portal;
providing access information from the access hub to the computing device based on the access request, wherein the access information includes an IP address associated with the connection manager and a URL associated with the web portal;
establishing a communication session between the computing device and the private network by using the web portal to send communications from the device to the private network using the encrypted connection. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A method for remote access, comprising:
-
requesting access to a first device of a first network from a second device of a second network different from the first network, the first network having a first internal node inside a firewall of the first network and the second network having a second internal node inside a firewall of the second network;
processing the access request at an access hub remote to the first and the second network;
using the first internal node to establish a first encrypted connection from within the first network through the firewall of the first network to a connection manager outside of the first and second network;
using the second internal node to establish a second encrypted connection from within the second network through the firewall of the second network to the connection manager;
wherein establishing the first and the second encrypted connection establishes a secure connection between the first device and the second device, the secure connection passing through the first and the second internal node. - View Dependent Claims (20, 21, 22)
-
-
23. A method for remote access, comprising:
-
providing an invitation to access a first computing device located within a private network, the invitation provided from a data center to a second computing device, wherein the second computing device is outside the private network, and wherein the invitation includes a time window within which the second computing device is allowed to access the first computing device;
sending an access request, within the time window, to access the first computing device, the request sent from the second computing device to the data center and processed at the data center;
providing access information from the data center to the second computing device, the access information including an IP address associated with a connection manager, wherein the connection manager is outside the private network;
using an internal node connected to the first computing device and inside a firewall of the private network to open an encrypted connection through the firewall to the connection manager;
establishing a temporary remote access communication session to the first computing device from the second computing device by connecting to the connection manager from the second computing device using the provided IP address. - View Dependent Claims (24, 25, 26, 27, 28, 29, 30, 31)
-
-
32. A method for remote access, comprising:
-
requesting access to a first computing device of a first network from a second computing device of a second network different from the first network, the first network having a first internal node inside a firewall of the first network and the second network having a second internal node inside a firewall of the second network;
processing the access request at an access hub remote to the first and the second network;
using the first internal node to establish an encrypted connection from the first internal node to the second internal node; and
wherein the second internal node has executable instructions storable on a memory thereof and executable by a processor thereof to configure forwarding of communications between the first computing device and the second computing device via the encrypted connection. - View Dependent Claims (33, 34, 35, 36)
-
-
37. A system for remote access, comprising:
-
a first private network including a first computing device in communication with an internal node inside of a firewall of the first private network, the internal node including executable instructions storable thereon that can be executed to make outbound requests through the firewall to a publicly accessible connection manager remote from the first private network to open an encrypted connection between the connection manager and the internal node; and
a data center remote from the first private network, the data center including executable instructions storable thereon and executable by a processor thereof to;
process requests for remote access to the first computing device received from a second computing device outside the first private network; and
provide access information to the second computing device used by the second computing device to connect to the connection manager establishing a communication session between the second computing device and the first computing device, wherein communications between second device and the first device are forwarded through the connection manager and the internal node by using the encrypted connection. - View Dependent Claims (38, 39, 40, 41, 42, 43, 44)
-
-
45. A method for remote access, comprising:
-
requesting access to a first computing device of a private network from a second computing device remote to the private network, the private network including an internal node inside of a firewall of the private network;
processing the access request at an access hub remote to the private network;
providing connection information from the access hub to the internal node and to the connection manager based on the access request;
establishing a remote access communication session between the first computing device and the second computing device by opening an encrypted connection between the internal node and the second computing device based on the connection information;
forwarding, through the internal node, communications sent during the remote access communication session between the first computing device and the second computing device. - View Dependent Claims (46)
-
Specification