METHODS AND SYSTEMS FOR PROVIDING AUTHORIZED REMOTE ACCESS TO A COMPUTING ENVIRONMENT PROVIDED BY A VIRTUAL MACHINE
First Claim
1. A method for providing authorized remote access to a computing environment provided by a virtual machine, the method comprising:
- (a) requesting, by a client machine, access to a resource;
(b) gathering, by a collection agent, information about the client machine;
(c) receiving, by a policy engine, the gathered information;
(d) making, by a policy engine, an access control decision based on the received information;
(e) identifying a computing environment already associated with the user in response to the received information, the identified computing environment provided by a virtual machine; and
(f) establishing, by a broker server responsive to the access control decision, a connection between the client machine and the identified computing environment.
7 Assignments
0 Petitions
Accused Products
Abstract
A method for providing authorized remote access to a computing environment provided by a virtual machine, includes the step of requesting, by a client machine, access to a resource. A collection agent gathers information about the client machine. A policy engine receives the gathered information. The policy engine makes an access control decision based on the received information. A computing environment already associated with the user is identified in response to the received information, the identified computing environment provided by a virtual machine. A broker server establishes, responsive to the access control decision, a connection between the client machine and the identified computing environment.
508 Citations
25 Claims
-
1. A method for providing authorized remote access to a computing environment provided by a virtual machine, the method comprising:
-
(a) requesting, by a client machine, access to a resource;
(b) gathering, by a collection agent, information about the client machine;
(c) receiving, by a policy engine, the gathered information;
(d) making, by a policy engine, an access control decision based on the received information;
(e) identifying a computing environment already associated with the user in response to the received information, the identified computing environment provided by a virtual machine; and
(f) establishing, by a broker server responsive to the access control decision, a connection between the client machine and the identified computing environment. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A system for providing authorized remote access to a computing environment provided by a virtual machine, the system comprising:
-
a collection agent gathering information about a client machine;
a policy engine receiving the gathered information, making an access control decision based on the received information, and requesting an enumeration of computing environments associated with a user of the client machine, the request including the access control decision; and
a broker server enumerating a computing environment associated with the client machine responsive to the access control decision, the enumerated computing environment provided by a virtual machine. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23, 24, 25)
-
Specification