×

Systems and methods for facilitating secure remote access to sensitive data from an embedded device

  • US 7,739,493 B2
  • Filed: 05/08/2003
  • Issued: 06/15/2010
  • Est. Priority Date: 05/08/2003
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method for facilitating secure remote access to sensitive data from an embedded device, the method being implemented by a data router, the method comprising:

  • obtaining the sensitive data together with non-sensitive data, wherein the sensitive data and the non-sensitive data relate to operation of the embedded device, wherein the embedded device and the data router are under the control of an organization;

    separating the sensitive data from the non-sensitive data;

    translating the sensitive data into a format that is consistent with a communication protocol that governs electronic communication over a first communication channel;

    translating the non-sensitive data into a format that is consistent with a communication protocol that governs electronic communication over a second communication channel;

    securing the sensitive data to create secured sensitive data;

    transmitting the secured sensitive data over the first communication channel to an organization-controlled server, wherein the organization-controlled server is also under the control of the organization, wherein the secured sensitive data passes through a third-party server en route to the organization-controlled server, wherein the third-party server is not under the control of the organization;

    transmitting the non-sensitive data over the second communication channel to the third-party server;

    wherein the sensitive data is obtained, secured, and transmitted in response to a request from the organization-controlled server; and

    wherein the non-sensitive data is obtained and transmitted in response to a request from the third-party server;

    wherein obtaining the sensitive data or obtaining the non-sensitive data comprises transmitting a request to the embedded device, determining that the embedded device has not responded to the request, and when the embedded device has not responded, generating data that indicates that the embedded device has not responded to the request;

    wherein the organization-controlled server and the third-party server are accessible to remote clients; and

    wherein the organization-controlled server is unable to fulfill client requests for the non-sensitive data.

View all claims
  • 5 Assignments
Timeline View
Assignment View
    ×
    ×