VIRTUAL DESKTOP ACCELERATOR WITH SUPPORT FOR MULTIPLE CRYPTOGRAPHIC CONTEXTS
First Claim
1. One or more computer-readable non-transitory storage media embodying software that is operable when executed to:
- initiate a remote desktop session between a client and a server using a first communication protocol;
intercept and manage, by a virtual desktop access client, the initiated remote desktop session;
establish, by the virtual desktop access client, a first connection with the server using the first communication protocol;
exchange a plurality of cryptographic contexts with the server;
receive a token encrypted using one of the plurality of cryptographic contexts from the server;
send the token from a client device to the server or a proxy to authenticate the client device; and
initiate a second connection with the server, via a proxy, wherein the second connection is initiated using a second communication protocol.
14 Assignments
0 Petitions
Accused Products
Abstract
In particular embodiments, a method includes intercepting a remote desktop connection request and connecting to a network gateway based on the remote desktop connection request. A first connection with a server is initiated via the network gateway using a first communication protocol. A plurality of cryptographic contexts are exchanged with the server. A token encrypted using one of the plurality of cryptographic contexts is received from the server. The token is sent from a client device to the server or a proxy to authenticate the client device, and a second connection is initiated with the server, via the proxy, using a second communication protocol.
-
Citations
20 Claims
-
1. One or more computer-readable non-transitory storage media embodying software that is operable when executed to:
-
initiate a remote desktop session between a client and a server using a first communication protocol; intercept and manage, by a virtual desktop access client, the initiated remote desktop session; establish, by the virtual desktop access client, a first connection with the server using the first communication protocol; exchange a plurality of cryptographic contexts with the server; receive a token encrypted using one of the plurality of cryptographic contexts from the server; send the token from a client device to the server or a proxy to authenticate the client device; and initiate a second connection with the server, via a proxy, wherein the second connection is initiated using a second communication protocol. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method comprising:
-
initiating a remote desktop connection between a client and a server using a first communication protocol; intercepting and managing, by a virtual desktop access client, the remote desktop connection; establishing, by the virtual desktop access client, a first connection with the server using the first communication protocol; exchanging a plurality of cryptographic contexts with the server; receiving a token encrypted using one of the plurality of cryptographic contexts from the server; sending the token from a client device to the server or a proxy to authenticate the client device; and initiating a second connection with the server, via a proxy, wherein the second connection is initiated using a second communication protocol. - View Dependent Claims (8, 9, 10, 11, 12, 13)
-
-
14. A system comprising:
-
one or more processors; and a memory coupled to the processors comprising instructions executable by the processors, the processors being operable when executing the instructions to; initiate a remote desktop connection between a client and a server using a first communication protocol; establish a remote desktop protocol session between the client and a server using a first communication protocol; intercept and manage, by a virtual desktop access client, the remote desktop connection; establish, by the virtual desktop access client, a first connection with the server using the first communication protocol; receive a token encrypted using one of the plurality of cryptographic contexts from the server; send the token from a client device to the server or a proxy to authenticate the client device; and initiate a second connection with the server, via a proxy, wherein the second connection is initiated using a second communication protocol. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification