METHODS AND SYSTEMS FOR PROVIDING REMOTE ACCESS TO A COMPUTING ENVIRONMENT PROVIDED BY A VIRTUAL MACHINE
First Claim
Patent Images
1. A method for providing remote access to a computing environment provided by a virtual machine, the method comprising:
- (a) receiving authentication information associated with a user of a client machine;
(b) identifying, based on the received authentication information, a computing environment provided by a virtualized operating system and already associated with the user; and
(c) establishing a connection between the client machine and the identified computing environment.
8 Assignments
0 Petitions
Accused Products
Abstract
A method for providing remote access to a computer environment provided by a virtual machine includes the step of receiving authentication information associated with a user of a client machine. Based on the received authentication information, a computer environment provided by a virtualized operating system and already associated with the user is identified. A connection is established between the client machine and the identified computing environment
-
Citations
68 Claims
-
1. A method for providing remote access to a computing environment provided by a virtual machine, the method comprising:
-
(a) receiving authentication information associated with a user of a client machine;
(b) identifying, based on the received authentication information, a computing environment provided by a virtualized operating system and already associated with the user; and
(c) establishing a connection between the client machine and the identified computing environment. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A method for providing remote access to a plurality of application sessions, the method comprising:
-
(a) receiving, at a client machine, a selection of a single user interface element by a user of the client machine;
(b) transmitting, in response to the user interface element selection, authentication information associated with the user;
(c) identifying, based on the transmitted authentication information, a computing environment provided by a virtualized operating system and already associated with the user; and
(d) establishing a connection between the client machine and the identified computing environment. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40)
-
-
41. A server for providing remote access to a computing environment, the server comprising:
-
a network module receiving authentication information associated with a user operating a client machine;
a data store containing an identifier of a computing environment associated with the user and provided by a virtual machine;
a broker process connecting the client machine to the identified computing environment enumerated in the data store in response to the received information. - View Dependent Claims (42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68)
-
Specification