Secure desktop for a network meeting
First Claim
1. A method comprising:
- with a network meeting application executing on a presenter device, receiving a request for a network meeting at the presenter device having a working desktop as a first environment for executing applications on the presenter device;
with the network meeting application, automatically creating, in response to the request, a secure desktop on the presenter device separate from the working desktop as a second environment in which software applications can be launched by the presenter on the presenter device and execute on the presenter device during the network meeting;
with the network meeting application, presenting the secure desktop to a remote device via the network meeting;
with the network meeting application, allowing remote control of the secure desktop of the presenter device by the remote device; and
with the network meeting application, blocking the remote device from accessing the working desktop of the presenter device.
12 Assignments
0 Petitions
Accused Products
Abstract
A network meeting application for providing network meetings, such as web conference meetings, runs on a presenter device. In response to a request for a network meeting from an attendee device, the presenter device creates a secure desktop separate from a working desktop. The presenter may use the secure desktop to share documents, presentations, or other applications with the attendee device. The attendee device is blocked from accessing the working desktop of the presenter device. A presenter using the presenter device may switch between the working desktop and the secure desktop. Security policies, downloaded to the presenter device from a server, determine the applications the attendee may run on the secure desktop. The secure desktop thereby protects the integrity of the presenter'"'"'s working desktop during a web conference meeting, while allowing documents, presentations, or other applications to be shared with attendees via the secure desktop.
-
Citations
33 Claims
-
1. A method comprising:
-
with a network meeting application executing on a presenter device, receiving a request for a network meeting at the presenter device having a working desktop as a first environment for executing applications on the presenter device; with the network meeting application, automatically creating, in response to the request, a secure desktop on the presenter device separate from the working desktop as a second environment in which software applications can be launched by the presenter on the presenter device and execute on the presenter device during the network meeting; with the network meeting application, presenting the secure desktop to a remote device via the network meeting; with the network meeting application, allowing remote control of the secure desktop of the presenter device by the remote device; and with the network meeting application, blocking the remote device from accessing the working desktop of the presenter device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 33)
-
-
14. A device comprising:
-
a network meeting application executing within a working desktop that provides a first environment for executing applications on a presenter device, wherein the network meeting application receives a request for a network meeting; and a secure desktop, separate from the working desktop, automatically created by the network meeting application in response to the request as a second environment in which software applications can be launched by the presenter on the presenter device and execute on the presenter device during the network meeting, wherein the network meeting application presents the secure desktop to a remote device via the network meeting, allows remote control of the secure desktop of the presenter device by the remote device, and blocks the remote device from accessing the working desktop of the presenter device. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26)
-
-
27. A system comprising:
-
a presenter device associated with a virtual private network (VPN) server, wherein a network meeting application executes within a working desktop of the presenter device, wherein the working desktop provides a first environment for launching and executing applications on the presenter device; and one or more attendee devices associated with the VPN server, wherein at least one of the attendee devices requests a network meeting from the presenter device, wherein, in response to the request, the presenter device automatically creates a secure desktop separate from the working desktop using the network meeting application as a second environment in which software applications can be launched by the presenter on the presenter device and execute on the presenter device during the network meeting, and wherein the network meeting application presents the secure desktop to the one or more attendee devices via the network meeting, allows remote control of the secure desktop of the presenter device by the remote device, and blocks the remote device from accessing the working desktop of the presenter device. - View Dependent Claims (28, 29, 30, 31)
-
-
32. A non-transitory computer-readable medium comprising instructions for causing a presenter device to:
-
with a network meeting application executing on the presenter device, receive a request for a network meeting at the presenter device having a working desktop as a first environment for executing applications on the presenter device; with the network meeting application, automatically create, in response to the request, a secure desktop on the presenter device separate from the working desktop as a second environment in which software applications can be launched by the presenter on the presenter device and execute on the presenter device during the network meeting; present, with the network meeting application, the secure desktop to a remote device via the network meeting; with the network meeting application, allow remote control of the secure desktop of the presenter device by the remote device; and with the network meeting application, block the remote device from accessing the working desktop of the presenter device.
-
Specification