Systems and methods for facilitating secure remote access to sensitive data from an embedded device
First Claim
1. A method for facilitating secure remote access to sensitive data from an embedded device, the method being implemented by a data router, the method comprising:
- obtaining the sensitive data together with non-sensitive data, wherein the sensitive data and the non-sensitive data relate to operation of the embedded device, wherein the embedded device and the data router are under the control of an organization;
separating the sensitive data from the non-sensitive data;
translating the sensitive data into a format that is consistent with a communication protocol that governs electronic communication over a first communication channel;
translating the non-sensitive data into a format that is consistent with a communication protocol that governs electronic communication over a second communication channel;
securing the sensitive data to create secured sensitive data;
transmitting the secured sensitive data over the first communication channel to an organization-controlled server, wherein the organization-controlled server is also under the control of the organization, wherein the secured sensitive data passes through a third-party server en route to the organization-controlled server, wherein the third-party server is not under the control of the organization;
transmitting the non-sensitive data over the second communication channel to the third-party server;
wherein the sensitive data is obtained, secured, and transmitted in response to a request from the organization-controlled server; and
wherein the non-sensitive data is obtained and transmitted in response to a request from the third-party server;
wherein obtaining the sensitive data or obtaining the non-sensitive data comprises transmitting a request to the embedded device, determining that the embedded device has not responded to the request, and when the embedded device has not responded, generating data that indicates that the embedded device has not responded to the request;
wherein the organization-controlled server and the third-party server are accessible to remote clients; and
wherein the organization-controlled server is unable to fulfill client requests for the non-sensitive data.
5 Assignments
0 Petitions
Accused Products
Abstract
A system for facilitating secure remote access to sensitive data is provided. The system includes a plurality of electronic devices. These electronic devices are under the control of an organization. The system also includes a data router. When the data router obtains sensitive data that is to be made available to remote clients, the data router secures the sensitive data and transmits the secured sensitive data over a first communication channel to an organization-controlled server. When the data router obtains other data that is to be made available to remote clients, the data router transmits the other data over the second communication channel to a third-party server.
-
Citations
1 Claim
-
1. A method for facilitating secure remote access to sensitive data from an embedded device, the method being implemented by a data router, the method comprising:
-
obtaining the sensitive data together with non-sensitive data, wherein the sensitive data and the non-sensitive data relate to operation of the embedded device, wherein the embedded device and the data router are under the control of an organization; separating the sensitive data from the non-sensitive data; translating the sensitive data into a format that is consistent with a communication protocol that governs electronic communication over a first communication channel; translating the non-sensitive data into a format that is consistent with a communication protocol that governs electronic communication over a second communication channel; securing the sensitive data to create secured sensitive data; transmitting the secured sensitive data over the first communication channel to an organization-controlled server, wherein the organization-controlled server is also under the control of the organization, wherein the secured sensitive data passes through a third-party server en route to the organization-controlled server, wherein the third-party server is not under the control of the organization; transmitting the non-sensitive data over the second communication channel to the third-party server; wherein the sensitive data is obtained, secured, and transmitted in response to a request from the organization-controlled server; and wherein the non-sensitive data is obtained and transmitted in response to a request from the third-party server; wherein obtaining the sensitive data or obtaining the non-sensitive data comprises transmitting a request to the embedded device, determining that the embedded device has not responded to the request, and when the embedded device has not responded, generating data that indicates that the embedded device has not responded to the request; wherein the organization-controlled server and the third-party server are accessible to remote clients; and wherein the organization-controlled server is unable to fulfill client requests for the non-sensitive data.
-
Specification