METHODS AND SYSTEMS FOR PROVIDING AND CONTROLLING CRYPTOGRAPHIC SECURE COMMUNICATIONS ACROSS UNSECURED NETWORKS
First Claim
1. A method of providing secure access to network resources, the method comprising:
- defining in a provisioning utility one or more communities of interest, each community of interest including one or more users and associated with a key;
providing a service key to a client computing device, the service key useable to establish a secure connection to a service enclave, the service enclave including an authorization server; and
transmitting from the authorization server, for each community of interest including an identified user of the client computing device;
an identity of a customer enclave; and
a key associated with a community of interest including the user of the client computing device, the community of interest including computing resources included in the customer enclave.
7 Assignments
0 Petitions
Accused Products
Abstract
Methods and systems for providing secure access to network resources are disclosed. A method includes defining in a provisioning utility one or more communities of interest, each community of interest including one or more users and associated with a key. The method includes providing a service key to a client computing device that is useable to establish a secure connection to a service enclave including an authorization server. The method also includes transmitting from the authorization server, for each community of interest including an identified user of the client computing device, an identity of a customer enclave and a key associated with a community of interest including the user of the client computing device, the community of interest including computing resources included in the customer enclave.
72 Citations
22 Claims
-
1. A method of providing secure access to network resources, the method comprising:
-
defining in a provisioning utility one or more communities of interest, each community of interest including one or more users and associated with a key; providing a service key to a client computing device, the service key useable to establish a secure connection to a service enclave, the service enclave including an authorization server; and transmitting from the authorization server, for each community of interest including an identified user of the client computing device; an identity of a customer enclave; and a key associated with a community of interest including the user of the client computing device, the community of interest including computing resources included in the customer enclave. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A system for providing secure access to network resources, the system comprising:
-
a provisioning utility defining one or more communities of interest, each community of interest including one or more users and associated with a key; an authorization server configured to establish a secure connection to a client computing device using a service key, and, upon authorizing a user at the client computing device, transmit to the client computing device, for each community of interest including an identified user of the client computing device; an identity of a customer enclave; and a key associated with a community of interest including the identified user of the client computing device, the community of interest including computing resources included in the customer enclave. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A computer-readable medium comprising computer executable instructions which, when executed, cause a distributed computing system to perform a method of providing secure access to network resources, the method comprising:
-
defining in a provisioning utility one or more communities of interest, each community of interest including one or more users, or groups of users, and associated with a key; providing a service key to a client computing device, the service key useable to establish a secure connection to a service enclave, the service enclave including an authorization server; and transmitting from the authorization server, for each community of interest including an identified user of the client computing device; an identity of a customer enclave; and a key associated with a community of interest including the identified user of the client computing device, the community of interest including computing resources included in the customer enclave. - View Dependent Claims (22)
-
Specification