System and method for accessing host computer via remote computer
DC CAFCFirst Claim
Patent Images
1. A method of enabling communication between a host and a remote device using a controller, comprising:
- connecting the controller to the host;
connecting the controller to the remote device, the host and the remote device being in separate locations;
validating, at the controller, digital identity certificates received from each of the host and the remote device, each identity certificate containing (i) the public half of an asymmetric key algorithm key pair, (ii) identity information, and (iii) a digital signature of the issuing certificate authority, thereby converting the host to a validated host, and converting the remote device to a validated remote device;
receiving, at the controller, a selection of the host from the validated remote device;
sending parameters for the validated remote device from the controller to the selected host;
sending an instruction, from the controller to the selected host, to establish a connection to the remote device;
receiving, at the controller, notifications from the selected host and the validated remote device that a connection exists therebetween; and
after receiving notice of a connection between the selected host and the validated remote device refraining from involvement, at the controller, in transporting data between the selected host and the validated remote device, so that the selected host and the validated remote device subsequently communicate with each other without using any resource of the controller.
1 Assignment
Litigations
1 Petition
Reexamination
Accused Products
Abstract
In a peer-to-peer fashion, various host computers communicate with various remote computers using the Internet so that user inputs from the remote computers are transferred to the host computers as if the user inputs occurred locally, and information generated by the host computers is displayed on the remote computers. Thus, a remote computer is able to access all of the information and application programs on the host computer.
31 Citations
11 Claims
-
1. A method of enabling communication between a host and a remote device using a controller, comprising:
-
connecting the controller to the host; connecting the controller to the remote device, the host and the remote device being in separate locations; validating, at the controller, digital identity certificates received from each of the host and the remote device, each identity certificate containing (i) the public half of an asymmetric key algorithm key pair, (ii) identity information, and (iii) a digital signature of the issuing certificate authority, thereby converting the host to a validated host, and converting the remote device to a validated remote device; receiving, at the controller, a selection of the host from the validated remote device; sending parameters for the validated remote device from the controller to the selected host; sending an instruction, from the controller to the selected host, to establish a connection to the remote device; receiving, at the controller, notifications from the selected host and the validated remote device that a connection exists therebetween; and after receiving notice of a connection between the selected host and the validated remote device refraining from involvement, at the controller, in transporting data between the selected host and the validated remote device, so that the selected host and the validated remote device subsequently communicate with each other without using any resource of the controller. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
Specification