Wormhole devices for usable secure access to remote resource
First Claim
1. A token, comprising:
- a memory, including;
a first set of processing instructions for configuring remote access to a particular remote resource residing upon a computing device on a network the first set of processing instructions containing device configuration information of credentials, a list of identified resources on the device and associated user requests with the resources, and administrative tasks;
a second set of processing instructions for operating the token in a legacy environment;
security credentials; and
resource configuration information for the particular remote resource, wherein each particular remote resource has its own configuration information including intended accesses, authentication measures, and safeguards for the remote resource to maintain;
an interface through which a connection to a client host is established; and
a processor;
in response to user input for configuring a remote access connection with the particular remote resource, executing the first set of processing instructions that include;
establishing a trusted connection through the interface with the particular remote resource;
exchanging credentials associated with the particular remote resource over the trusted connection for establishing a secure connection with the particular remote resource over an untrusted connection; and
defining the resource configuration information for accessing user selected data or services available at the particular remote resource; and
in response to user input received in a legacy environment, executing the second set of processing instructions that include automatically;
establishing, over an untrusted connection to the client host available through the interface, a secure connection with the particular remote resource using the security credentials stored in the memory;
configuring the secure connection for access to the user selected data or services available at the particular remote resource using the configuration information for the particular remote resource stored in the memory;
making the user selected data or services at the particular remote resource available in the legacy environment; and
defending against attempted access to data or services available at the token other than the user selected data or services made available in the legacy environment, including attempts by the client host.
6 Assignments
0 Petitions
Accused Products
Abstract
A token has a memory, an interface allow connection to a host, and a processor. The processor, in response to user input for configuring a remote access connection, executes a first set of processing instructions to establish a trusted connection with the server host, exchanges credentials over the trusted connection to establish a secure connection with the server host over an untrusted connection, and defines configuration information for accessing user selected data or services. The processor, in response to user input received in a legacy environment, executes a second set of processing instructions that includes establishing, over an untrusted connection, a secure connection with the server host using the security credentials, configuring the secure connection for access to the data or services, making the data or services available in the legacy environment, and defends against attempted access to data or services available at the token other than the data or services made available in the legacy environment.
52 Citations
25 Claims
-
1. A token, comprising:
-
a memory, including; a first set of processing instructions for configuring remote access to a particular remote resource residing upon a computing device on a network the first set of processing instructions containing device configuration information of credentials, a list of identified resources on the device and associated user requests with the resources, and administrative tasks; a second set of processing instructions for operating the token in a legacy environment; security credentials; and resource configuration information for the particular remote resource, wherein each particular remote resource has its own configuration information including intended accesses, authentication measures, and safeguards for the remote resource to maintain; an interface through which a connection to a client host is established; and a processor; in response to user input for configuring a remote access connection with the particular remote resource, executing the first set of processing instructions that include; establishing a trusted connection through the interface with the particular remote resource; exchanging credentials associated with the particular remote resource over the trusted connection for establishing a secure connection with the particular remote resource over an untrusted connection; and defining the resource configuration information for accessing user selected data or services available at the particular remote resource; and in response to user input received in a legacy environment, executing the second set of processing instructions that include automatically; establishing, over an untrusted connection to the client host available through the interface, a secure connection with the particular remote resource using the security credentials stored in the memory; configuring the secure connection for access to the user selected data or services available at the particular remote resource using the configuration information for the particular remote resource stored in the memory; making the user selected data or services at the particular remote resource available in the legacy environment; and defending against attempted access to data or services available at the token other than the user selected data or services made available in the legacy environment, including attempts by the client host. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A method, comprising:
-
receiving a user input at a token attached to a client host; if the user input is an input for configuring a remote access connection with a particular remote resource residing upon a computing device on a network; establishing a trusted connection through an interface with the particular remote resource; exchanging credentials over the trusted connection for establishing a secure connection with the particular remote resource over an untrusted connection; and defining resource configuration information for accessing user selected data or services available at the particular remote resource, wherein the resource configuration information comprises intended accesses, authentication measures, and safeguards for the remote resource to maintain; and if the user input is received in a legacy environment; establishing, over an untrusted connection with the client host available through the interface, a secure connection with the particular remote resource using security credentials stored in a memory; configuring the secure connection for access to the user selected data or services available at the particular remote resource using resource configuration information stored in the memory, wherein each particular remote resource has a configuration for that particular remote resource including intended accesses, authentication measures, and safeguards for the remote resource to maintain; making the user selected data or services at the particular remote resource available in the legacy environment; and defending against attempted access to data or services available at the token other than the user selected data or services made available in the legacy environment, including attempts by the client host. - View Dependent Claims (21, 22, 23, 24, 25)
-
Specification