Trusted Content Distribution System
First Claim
1. A method for providing for a user a secure connection between a first electronic device and a second electronic device over a communication network that may be insecure and that connects the first and second electronic devices, the secure connection being used for exchanging data while executing an application, whereby said first electronic device, comprises:
- a human machine interface such as visualization means; and
at least one communication portsaid first electronic device not being capable of executing the application alone;
whereby said second electronic device is adapted for storing, controlling and executing applications and storage of data and administrating the secure connection, whereby a third user specific electronic device such as a USB stick is used, the third user specific electronic device comprisingmemory, storing user identification information; and
an initialization modulethe method comprising the step of;
connecting the first electronic device with a third user specific electronic device via the communication port;
initializing and managing by said third electronic device the operation of the first electronic device for setting-up a secure connection over said communication network with the second electronic device; and
managing every interface of the first electronic device and optionally the secure connection from the second electronic device, the managing comprising administrating the secure connection by the second electronic device by receiving over the secured connection the user identification information and based thereon authenticate the user, the administrating includes allowing or denying access to data and/or applications stored on the second electronic device based on the security settings of the authenticated user.
1 Assignment
0 Petitions
Accused Products
Abstract
A trusted content distribution system is described comprising a trustworthy enduser device and a network management infrastructure, the enduser device being adapted for communications between the enduser device and the networked infrastructure via a secure tunnel; the end user device comprising a host processor and memory; secure non-volatile memory for storing an operating system, a trusted boot process executed by the host processor to boot the end user device into a known state, means for communicating with a visualisation device.
40 Citations
15 Claims
-
1. A method for providing for a user a secure connection between a first electronic device and a second electronic device over a communication network that may be insecure and that connects the first and second electronic devices, the secure connection being used for exchanging data while executing an application, whereby said first electronic device, comprises:
-
a human machine interface such as visualization means; and at least one communication port said first electronic device not being capable of executing the application alone;
whereby said second electronic device is adapted for storing, controlling and executing applications and storage of data and administrating the secure connection, whereby a third user specific electronic device such as a USB stick is used, the third user specific electronic device comprisingmemory, storing user identification information; and an initialization module the method comprising the step of; connecting the first electronic device with a third user specific electronic device via the communication port; initializing and managing by said third electronic device the operation of the first electronic device for setting-up a secure connection over said communication network with the second electronic device; and managing every interface of the first electronic device and optionally the secure connection from the second electronic device, the managing comprising administrating the secure connection by the second electronic device by receiving over the secured connection the user identification information and based thereon authenticate the user, the administrating includes allowing or denying access to data and/or applications stored on the second electronic device based on the security settings of the authenticated user. - View Dependent Claims (2, 3)
the method comprising the steps of: establishing the secure connection in accordance with the method of claim 1; and executing the application essentially on the second electronic device while exchanging the data over the secure connection for presentation to the user via the human machine interface of the first electronic device.
-
-
3. The method of claim 1, after establishing the secure connection, further comprising the steps of:
executing the application under the control of the second electronic device while exchanging the content over the secure connection for presentation to the user via a human machine interface of the first electronic device.
-
4. A trusted content distribution system for providing for a user a secure connection between a first electronic device and a second electronic device over a communication network that may be insecure and that connects the first and second electronic devices, the secure connection being used for exchanging data, said first electronic device comprising:
-
a human machine interface such as visualization means; and at least one communication port said first electronic device not being capable of executing the application alone; whereby said second electronic device is adapted for storing and executing applications and storage of data and administrating the secure connection, whereby a third user specific electronic device such as a USB stick is used, the third user specific electronic device comprising memory, storing user identification information; and an initialization module the system further comprising; the at least one communication port being adapted for connecting the first electronic device with a third user specific electronic device; means for initializing and managing by said third electronic device the operation of the first electronic device for setting-up a secure connection over said communication network with the second electronic device; and means for managing every interface of the first electronic device and optionally the secure connection from the second electronic device, the managing comprising administrating the secure connection by the second electronic device by receiving over the secure connection the user identification information and based thereon authenticate the user, the administrating includes allowing or denying access to data and/or applications stored on the second electronic device based on the security settings of the authenticated user. - View Dependent Claims (5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A bootable user specific electronic device comprising:
-
memory, storing user identification information;
a communications port and an initialization modulethe user specific electronic device having means for initializing and managing the operation of a further electronic device for setting-up a secure connection over a communication network with a third electronic device for trusted content distribution using a secure connection between the further electronic device and the third electronic device, the secure connection being used for exchanging data, said further electronic device comprising;
a human machine interface such as visualization means;
the communications port being adapted for connecting the user specific electronic device to the further electronic device, the initialization module being adapted to install an operating system on the further electronic device that allows managing of every interface of the further electronic device from the third electronic device via the secure connection, the managing comprising administrating the secure connection by the third electronic device by receiving over the secure connection the user identification information and based thereon authenticate the user, the administrating includes allowing or denying access to data and/or applications stored on the user specific electronic device based on the security settings of the authenticated user.
-
Specification