Remote Network Access Via Virtual Machine
First Claim
1. A method of provisioning a customized virtual machine image to a user on a host computer so as to permit establishment of a virtual machine on the host computer, the method comprising:
- providing a virtual machine image for loading onto the host computer, such image having an operating system and as yet not customized to the user; and
providing previously generated customized configuration data from a source outside of the image for use by the operating system.
4 Assignments
0 Petitions
Accused Products
Abstract
A virtual machine project manager creates a generic, i.e., not user-specific, virtual machine image file. Copies of this image file may be distributed to one or more users, each of whom may then use an automated procedure to generate a user-specific virtual machine image file and, thus, a user-specific virtual machine on his/her remote host computer. The generic virtual machine image file may be distributed on computer-readable media, such as a DVD disks, or the file may be stored on a server and downloaded (such as via the Internet) by the users. Each user also receives or downloads a token, which contains a small amount of user-specific information that is used by the automated procedure to provision the generic virtual machine image file for the particular user. A virtual machine accesses a security token connected to a host computer to automatically authenticate or re-authenticate a user, such as when a virtual private network connection is restarted. Substantially identical session identifiers are used by a host computer and a virtual machine, or by two or more virtual machines and, when communicating with an integrated access server. A file server stores virtual machine images that are accessed by a plurality of host computers.
-
Citations
52 Claims
-
1. A method of provisioning a customized virtual machine image to a user on a host computer so as to permit establishment of a virtual machine on the host computer, the method comprising:
-
providing a virtual machine image for loading onto the host computer, such image having an operating system and as yet not customized to the user; and providing previously generated customized configuration data from a source outside of the image for use by the operating system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A method of providing access by a remote computer to a computing environment, such environment having a virtual private network connection, the method comprising:
-
providing a virtual machine image for loading onto the remote computer, such image (i) permitting establishment of a virtual machine on the remote computer, (ii) having an operating system, (iii) including instructions and data for establishing a VPN connection between the virtual machine and a computer environment, and (iv) being as yet not customized to a specific user; and providing previously generated customized configuration data from a source outside of the image to the operating system, such configuration data permitting the virtual machine to log in to the environment and become registered onto a domain of the environment. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21, 22, 23)
-
-
24. A computer program product comprising:
a computer-readable medium on which is stored a virtual machine image for loading onto a host computer, such image having an operating system and as yet not customized to a user. - View Dependent Claims (25)
-
26. A method of automatically obtaining at least one user credential, comprising:
-
connecting a security token to a port of a host computer; executing a virtual machine on the host computer; from within the virtual machine, accessing the port and reading from the security token data associated with at least one user credential related to a user; and from within the virtual machine, using the data thus read to log the user into an operating system executed by the virtual machine.
-
-
27. A method of automatically obtaining at least one user credential, comprising:
-
connecting a security token to a port of a host computer; executing a virtual machine on the host computer; from within the virtual machine, accessing the port and reading from the security token data associated with at least one user credential related to a user; and using the data thus read to establish a network connection between the virtual machine and a server.
-
-
28. A method of automatically obtaining at least one user credential, comprising:
-
connecting a security token to a port of a host computer; executing a virtual machine on the host computer; executing a virtual machine player on the host computer; from within the player, accessing the port and reading from the security token data associated with at least one user credential related to a user; and from within the virtual machine, accessing the player to obtain the data thus read. - View Dependent Claims (29, 30)
-
-
31. A method of automatically obtaining at least one user credential, comprising:
-
executing a host operating system on a host computer; within the host operating system, caching at least one user credential related to a user who is logged into the host operating system; executing a virtual machine on the host computer; from within a virtual machine player, obtaining the at least one cached user credential from the host operating system; and from within the virtual machine, using the obtained at least one user credential to log the user into an operating system executed by the virtual machine.
-
-
32. A method of establishing parallel sessions between a host computer and an integrated access server and between a virtual machine being executed on the host computer and the integrated access server, comprising:
-
using a first session identifier to establish a session between the host computer and the integrated access server; and using a second session identifier, substantially identical to the first session identifier, to establish a session between the virtual machine and the integrated access server. - View Dependent Claims (33, 34)
-
-
35. A method of establishing parallel sessions between a first virtual machine being executed on a host computer and an integrated access server and between a second virtual machine being executed by the host computer and the integrated access server, comprising:
-
using a first session identifier to establish a session between the first virtual machine and the integrated access server; and using a second session identifier, substantially identical to the first session identifier, to establish a session between the second virtual machine and the integrated access server. - View Dependent Claims (36, 37, 38)
-
-
39. A method of coordinating an access request from a computer to a first integrated access server and an access request from the computer to a second integrated access server, wherein the first and the second integrated access servers maintain distinct universes of patient identifiers, the method comprising:
-
receiving a patient identifier that identifies a patient within the universe of patient identifiers maintained by the first integrated access server; sending the received patient identifier to the first integrated access server; mapping the received patient identifier into a second patient identifier that identifies the same patient within the universe of patient identifiers maintained by the second integrated access server; and sending the second patient identifier to the second integrated access server. - View Dependent Claims (40)
-
-
41. In a network that includes a plurality of host computers interconnected to a file server, a method of executing a virtual machine, comprising:
-
storing a plurality of virtual machine images on the file server; loading a selected one of the plurality of virtual machine images from the file server onto a first selected one of the host computers; and executing the loaded virtual machine image on the first selected one of the host computers. - View Dependent Claims (42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52)
-
Specification