Apparatuses, methods and systems for a secure resource access and placement platform
First Claim
Patent Images
1. A multi-layered processor-implemented method for secure access to corporate resources, comprising:
- receiving a Payload specific request to access a plurality of corporate resources from at least one user;
initializing via a processor a uniquely identified Shell based on the received request, wherein the Shell comprises a plurality of Payload backups;
receiving a set of user authentication credentials from the user;
sending the set of user authentication credentials to a corporate server controlling the corporate resources;
receiving an authentication decision from the corporate server; and
if the authentication decision is affirmative,establishing a secure connection between the Shell and the corporate server,receiving a plurality of control policies from the corporate server via the secure connection, andaccessing the plurality of corporate resources via the established secure connection in compliance with the received control policies.
2 Assignments
0 Petitions
Accused Products
Abstract
The APPARATUSES, METHODS AND SYSTEMS FOR A SECURE RESOURCE ACCESS AND PLACEMENT PLATFORM (“SRAP PLATFORM”) provides a secure supporting infrastructure within a corporate network framework and applications based thereon for use and placement of corporate resources. A non-trusted device may be authorized to access and use corporate resources, and the corporate network server may manage the placement of resources via the SRAP PLATFORM.
380 Citations
34 Claims
-
1. A multi-layered processor-implemented method for secure access to corporate resources, comprising:
-
receiving a Payload specific request to access a plurality of corporate resources from at least one user; initializing via a processor a uniquely identified Shell based on the received request, wherein the Shell comprises a plurality of Payload backups; receiving a set of user authentication credentials from the user; sending the set of user authentication credentials to a corporate server controlling the corporate resources; receiving an authentication decision from the corporate server; and if the authentication decision is affirmative, establishing a secure connection between the Shell and the corporate server, receiving a plurality of control policies from the corporate server via the secure connection, and accessing the plurality of corporate resources via the established secure connection in compliance with the received control policies. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27)
-
-
28. A multi-layered corporate resources secure access system, comprising:
-
a memory; a processor disposed in communication with said memory, and configured to Issue a plurality of processing instructions stored in the memory, wherein the processor issues instructions to; receiving a Payload specific request to access a plurality of corporate resources from at least one user; initializing a uniquely identified Shell based on the received request, wherein the uniquely identified Shell comprises at least the Payload and a Bubble; receiving a set of user authentication credentials from the user; sending the set of user authentication credentials to a corporate server controlling the corporate resources; receiving an authentication decision from the corporate server; and if the authentication decision is affirmative, establishing a secure connection between the Shell and the corporate server, receiving a plurality of control policies from the corporate server via the secure connection, and accessing the plurality of corporate resources via the established secure connection in compliance with the received control policies. - View Dependent Claims (29)
-
-
30. A multi-layered processor-implemented method for secure access to corporate resources, comprising:
-
receiving a Payload specific request to access a plurality of corporate resources from at least one user; initializing via a processor a uniquely identified Shell based on the received request; receiving a set of user authentication credentials from the user; sending the set of user authentication credentials to a corporate server controlling the corporate resources; receiving an authentication decision from the corporate server; and if the authentication decision is affirmative, establishing a secure connection between the Shell and the corporate server, wherein the established secure connection comprises at least one In-Band channel and at least one Out-of-Band channel, receiving a plurality of control policies from the corporate server via the secure connection, and accessing the plurality of corporate resources via the established secure connection in compliance with the received control policies.
-
-
31. A multi-layered processor-implemented method for secure access to corporate resources, comprising:
-
receiving a Payload specific request to access a plurality of corporate resources from at least one user; initializing via a processor a uniquely identified Shell based on the received request; receiving a set of user authentication credentials from the user; sending the set of user authentication credentials to a corporate server controlling the corporate resources; receiving an authentication decision from the corporate server; and if the authentication decision is affirmative, establishing a secure connection between the Shell and the corporate server, wherein the established secure connection to the corporate server has a relay point at a Transfer Plane entity, receiving a plurality of contra policies from the corporate server via the secure connection, and accessing the plurality of corporate resources via the established secure connection in compliance with the received control policies.
-
-
32. A multi-layered processor-implemented method for secure access to corporate resources, comprising:
-
receiving a Payload specific request to access a plurality of corporate resources from at least one user; initializing via a processor a uniquely identified Shell based on the received request; receiving a set of user authentication credentials from the user; sending the set of user authentication credentials to a corporate server controlling the corporate resources; receiving an authentication decision from the corporate server; and if the authentication decision is affirmative, establishing a secure connection between the Shell and the corporate server, receiving a plurality of control policies from the corporate server via the secure connection, wherein the plurality of control policies are received in the form of a plurality of Manifests by the uniquely identified Shell, and accessing the plurality of corporate resources via the established secure connection in compliance with the received control policies.
-
-
33. A multi-layered processor-implemented method for secure access to corporate resources, comprising:
-
receiving a Payload specific request to access a plurality of corporate resources from at least one user; initializing via a processor a uniquely identified Shell based on the received request; receiving a set of user authentication credentials from the user; sending the set of user authentication credentials to a corporate server controlling the corporate resources; receiving an authentication decision from the corporate server; and if the authentication decision is affirmative, establishing a secure connection between the Shell and the corporate server, receiving a plurality of control policies from the corporate server via an Out-of-Band channel of the secure connection, and accessing the plurality of corporate resources via the established secure connection in compliance with the received control policies.
-
-
34. A multi-layered processor-implemented method for secure access to corporate resources, comprising:
-
receiving a Payload specific request to access a plurality of corporate resources from at least one user; initializing via a processor a uniquely identified Shell based on the received request; receiving a set of user authentication credentials from the user; sending the set of user authentication credentials to a corporate server controlling the corporate resources; receiving an authentication decision from the corporate server; and if the authentication decision is affirmative, establishing a secure connection between the Shell and the corporate server, receiving a plurality of control policies from the corporate server via the secure connection, wherein receiving the plurality of control policies comprises monitoring and downloading updates by the Shell from a Transfer Plane entity via an Out-of-Band channel, and accessing the plurality of corporate resources via the established secure connection in compliance with the received control policies.
-
Specification