System and method for providing a secure connection between networked computers
First Claim
1. A method for obtaining secure connectivity between a server computer and a client computer, comprising:
- utilizing a network protocol inherent to an operating system on the client computer to automatically set up and establish a transient secure network connection endpoint on the client computer, wherein the utilizing is a result of a response comprising dynamically generated session-specific connection information, session-specific connection profile, or a combination thereof from the server computer to a request from the client computer, and wherein establishing the transient secure network connection endpoint on the client computer creates a transient secure network connection between the server computer and the transient secure network connection endpoint on the client computer without manual intervention or configuration by a user at the client computer; and
permitting secured access by the client computer to one or more network devices communicatively connected to the server computer via the transient secure network connection until the transient secure network connection between the server computer and the client computer is severed.
9 Assignments
0 Petitions
Accused Products
Abstract
Embodiments disclosed herein provide a system, method, and computer program product for obtaining secure connectivity between networked computing devices. The invention comprises utilizing a network protocol inherent to an operating system on a client device to automatically set up and establish a transient secure network connection endpoint on the client device. The act of utilizing can be a result of a server device responding to a connection request from the client device. The act of establishing the transient secure network connection endpoint on the client device creates a transient secure network connection between the server device and the transient secure network connection endpoint on the client device without manual intervention or configuration by a user at the client device. Secured access by the client device to one or more network devices is permitted until the transient secure network connection between the server device and the client device is severed.
256 Citations
17 Claims
-
1. A method for obtaining secure connectivity between a server computer and a client computer, comprising:
-
utilizing a network protocol inherent to an operating system on the client computer to automatically set up and establish a transient secure network connection endpoint on the client computer, wherein the utilizing is a result of a response comprising dynamically generated session-specific connection information, session-specific connection profile, or a combination thereof from the server computer to a request from the client computer, and wherein establishing the transient secure network connection endpoint on the client computer creates a transient secure network connection between the server computer and the transient secure network connection endpoint on the client computer without manual intervention or configuration by a user at the client computer; and permitting secured access by the client computer to one or more network devices communicatively connected to the server computer via the transient secure network connection until the transient secure network connection between the server computer and the client computer is severed. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A computer program product comprising at least two non-transitory computer readable storage media storing instructions translatable by at least two processors to perform:
-
utilizing a network protocol inherent to an operating system on a client computer to automatically set up and establish a transient secure network connection endpoint on the client computer, wherein the utilizing is a result of a response comprising dynamically generated session-specific connection information, session-specific connection profile, or a combination thereof from a server computer to a request from the client computer, and wherein establishing the transient secure network connection endpoint on the client computer creates a transient secure network connection between the server computer and the transient secure network connection endpoint on the client computer without manual intervention or configuration by a user at the client computer; and permitting secured access by the client computer to one or more network devices communicatively connected to the server computer via the transient secure network connection until the transient secure network connection between the server computer and the client computer is severed. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A system, comprising:
-
at least two processors; and at least two non-transitory computer readable storage media storing instructions translatable by the at least two processors to perform; utilizing a network protocol inherent to an operating system on a client computer to automatically set up and establish a transient secure network connection endpoint on the client computer, wherein the utilizing is a result of a response comprising dynamically generated session-specific connection information, session-specific connection profile, or a combination thereof from a server computer to a request from the client computer, and wherein establishing the transient secure network connection endpoint on the client computer creates a transient secure network connection between the server computer and the transient secure network connection endpoint on the client computer without manual intervention or configuration by a user at the client computer; and permitting secured access by the client computer to one or more network devices communicatively connected to the server computer via the transient secure network connection until the transient secure network connection between the server computer and the client computer is severed. - View Dependent Claims (14, 15, 16, 17)
-
Specification