×

Wormhole devices for usable secure access to remote resource

  • US 8,387,124 B2
  • Filed: 05/04/2007
  • Issued: 02/26/2013
  • Est. Priority Date: 03/15/2007
  • Status: Active Grant
First Claim
Patent Images

1. A token, comprising:

  • a memory, including;

    a first set of processing instructions for configuring remote access to a particular remote resource residing upon a computing device on a network the first set of processing instructions containing device configuration information of credentials, a list of identified resources on the device and associated user requests with the resources, and administrative tasks;

    a second set of processing instructions for operating the token in a legacy environment;

    security credentials; and

    resource configuration information for the particular remote resource, wherein each particular remote resource has its own configuration information including intended accesses, authentication measures, and safeguards for the remote resource to maintain;

    an interface through which a connection to a client host is established; and

    a processor;

    in response to user input for configuring a remote access connection with the particular remote resource, executing the first set of processing instructions that include;

    establishing a trusted connection through the interface with the particular remote resource;

    exchanging credentials associated with the particular remote resource over the trusted connection for establishing a secure connection with the particular remote resource over an untrusted connection; and

    defining the resource configuration information for accessing user selected data or services available at the particular remote resource; and

    in response to user input received in a legacy environment, executing the second set of processing instructions that include automatically;

    establishing, over an untrusted connection to the client host available through the interface, a secure connection with the particular remote resource using the security credentials stored in the memory;

    configuring the secure connection for access to the user selected data or services available at the particular remote resource using the configuration information for the particular remote resource stored in the memory;

    making the user selected data or services at the particular remote resource available in the legacy environment; and

    defending against attempted access to data or services available at the token other than the user selected data or services made available in the legacy environment, including attempts by the client host.

View all claims
  • 6 Assignments
Timeline View
Assignment View
    ×
    ×