Remote access
First Claim
1. A computer implemented method for accessing a remote computing system, the method comprising:
- receiving, at a conduit computing system, one or more user-initiated messages from a first computing system connected to the conduit computing system by a first network, at least one of the one or more user-initiated messages including information indicating authorization for access to a remote computing system connected to the conduit system by a second network;
in response to receiving the one or more user-initiated messages, sending, from the conduit computing system, a message over the second network to the remote computing system instructing the remote computing system to power on; and
channeling, by the conduit computing system, user input signals received over the first network from the first computing system and to the remote computing system to serve as inputs used in the execution of an application through the powered-on remote computer system, and in return, channeling, by the conduit computing system, screen images captured at the remote computing system and received over the second network from the remote computing system to the first computing system over the first network.
1 Assignment
0 Petitions
Accused Products
Abstract
A computer system is able to remotely access applications and data through a proprietary user computer system. Once the computer system seeking access has been authenticated, the remote proprietary user computing system is powered on. A conduit computing system is used to channel user input signals received over a general communications network from the accessing computer system to the remote proprietary user computing system. The channeled user input signals serve as inputs used in the execution of an application residing on the powered-on remote proprietary user computing system. The conduit computing system also channels screen images, captured at the remote proprietary user computing system, to the accessing computer system over the general communications network.
92 Citations
26 Claims
-
1. A computer implemented method for accessing a remote computing system, the method comprising:
-
receiving, at a conduit computing system, one or more user-initiated messages from a first computing system connected to the conduit computing system by a first network, at least one of the one or more user-initiated messages including information indicating authorization for access to a remote computing system connected to the conduit system by a second network;
in response to receiving the one or more user-initiated messages, sending, from the conduit computing system, a message over the second network to the remote computing system instructing the remote computing system to power on; and
channeling, by the conduit computing system, user input signals received over the first network from the first computing system and to the remote computing system to serve as inputs used in the execution of an application through the powered-on remote computer system, and in return, channeling, by the conduit computing system, screen images captured at the remote computing system and received over the second network from the remote computing system to the first computing system over the first network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A system for accessing computer applications on a remote user computer, the system comprising:
-
an authentication computer system accessible over a first network and connected to a second network, the authentication computer system being configured to determine whether a user identity operating on a first computing system is permitted to access the second network;
a waking computer system connected to the second network, the waking computer system being configured to power-on a remote user computer conditioned upon a determination that the user identity is permitted to access the remote user computer; and
a communication-conduit computer system connected to the second network, the communication-conduit computer system being configured to channel, by the conduit computing system, user input signals received over the first network from the first computing system and to the remote computing system to serve as inputs used in the execution of an application through the powered-on remote computer system, and in return, channel, by the conduit computing system, screen images captured at the remote computing system and received over the second network from the remote computing system to the first computing system over the first network. - View Dependent Claims (17, 18, 19, 20)
-
-
21. A computer program product tangibly embodied in an information carrier, the computer program product including instructions that, when executed, cause a remote access handling component to perform operations comprising:
-
receiving, over a first network from a first computing system, one or more user-initiated messages, at least one of the one or more user-initiated messages including information indicating authorization for access to a remote computing system accessible by a second network;
in response to receiving the one or more user-initiated messages, sending a message over the second network to the remote computing system instructing the remote computing system to power on; and
channeling user input signals received over the first network from the first computing system and to the remote computing system to serve as inputs used in the execution of an application through the powered-on remote computer system, and in return, channeling, by the conduit computing system, screen images captured at the remote computing system and received over the second network from the remote computing system to the first computing system over the first network. - View Dependent Claims (22, 23, 24, 25, 26)
-
Specification