×

Controlling access to a protected resource using a virtual desktop and ongoing authentication

  • US 8,701,174 B1
  • Filed: 09/27/2011
  • Issued: 04/15/2014
  • Est. Priority Date: 09/27/2011
  • Status: Active Grant
First Claim
Patent Images

1. A method of controlling access to a protected resource, the method comprising:

  • performing a continuous series of authentication operations between an end user device and an authentication engine;

    while the continuous series of authentication operations results in ongoing successful authentication, providing a virtual desktop session from a virtual desktop server to the end user device to enable a user at the end user device to access the protected resource using the virtual desktop session; and

    when the continuous series of authentication operations results in unsuccessful authentication, closing the virtual desktop session to prevent further access to the protected resource using the virtual desktop session;

    wherein the protected resource is a website;

    wherein providing the virtual desktop session from the virtual desktop server to the end user device to enable the user at the end user device to access the protected resource using the virtual desktop session includes supplying the virtual desktop session from the virtual desktop server to the end user device while the user runs, within the virtual desktop session, a browser application to access the website;

    wherein the browser runs in a virtual desktop server which is remote with respect to the end user device;

    wherein the website runs in a web server which is remote with respect to the end user device, the virtual desktop server and the web server residing at different physical locations;

    wherein supplying the virtual desktop session while the user runs, within the virtual desktop session, the browser application to access the website includes making the virtual desktop session available to the end user device while the user authenticates with the website running in the web server in a manner which is independent of the continuous series of authentication operations resulting in successful authentication between the end user device and the authentication engine;

    wherein performing the continuous series of authentication operations between the end user device and the authentication engine includes authenticating the end user device to the authentication engine, and authenticating the authentication engine to the end user device;

    wherein authenticating the end user device to the authentication engine includes evaluating, at the authentication engine, an end user device token code received from the end user device through a network;

    wherein the end user device token code is an end user device one-time passcode derived from a seed stored at the end user device; and

    wherein evaluating the end user device token code received from the end user device through the network includes comparing the end user device one-time passcode to an expected one-time passcode derived from a copy of the seed stored at the authentication engine;

    further including issuing a one-time passcode hardware device to the user for installation on the end user device, the one-time passcode hardware device being the source of the end user device one-time passcode; and

    wherein the end user device includes a virtual machine client which resides at a first location, the virtual desktop server resides at a second location which is separate from the first location, the protected resource resides at a third location which is separate from the first and second locations; and

    wherein providing the virtual desktop session from the virtual desktop server to the end user device while the continuous series of authentication operations results in ongoing successful authentication includes;

    creating a virtual machine on the virtual desktop server,providing user access to the virtual machine created on the virtual desktop server through the virtual machine client of the end user device to enable a user to operate the virtual machine remotely from the virtual machine client of the end user device, the user accessing the protected resource at the third location via the virtual machine created on the virtual desktop server at the second location from the virtual machine client of the end user device residing at the first location.

View all claims
  • 9 Assignments
Timeline View
Assignment View
    ×
    ×