Systems and methods for secure handling of secure attention sequences
First Claim
1. A method for authenticating, by a trusted component, a user of a desktop appliance to a remote machine, the method comprising:
- receiving, by a desktop appliance, a secure attention sequence from a user, wherein the secure attention sequence is one of;
a first key combination of a control key, an alt key, and a delete key, a second key combination including a menu key, or a third key combination including an operating system specific meta key;
invoking, responsive to receiving the secure attention sequence from the user, execution by the desktop appliance of a user interaction component, wherein the desktop appliance passes control over display and input focus to the user interaction component;
receiving, by the invoked user interaction component, via the control passed, authentication credentials associated with the user;
receiving, by the user interaction component executed by the desktop appliance, a request for access to a hosted resource executing remotely from the desktop appliance, the hosted resource presented to the user as a resource executing locally to the desktop appliance;
transmitting, by the desktop appliance, to a broker service, the received authentication credentials;
authenticating, by the broker service, the user, responsive to the received authentication credentials;
transmitting, by the broker service, to a remote machine, authentication data associated with the received authentication credentials;
authenticating, by the remote machine, the user, responsive to the received authentication data; and
providing, by the remote machine, to the desktop appliance, access to the hosted resource.
7 Assignments
0 Petitions
Accused Products
Abstract
A method for authenticating, by a trusted component, a user of a desktop appliance to a remote machine includes executing, by a desktop appliance, a user interaction component, responsive to receiving a secure attention sequence from a user. The user interaction component receives authentication credentials associated with the user. The desktop appliance transmits, to a broker service, the received authentication credentials. The broker service authenticates the user, responsive to the received authentication credentials. The broker service transmits, to a remote machine, authentication data associated with the received authentication credentials. The remote machine authenticates the user, responsive to the received authentication data. The remote machine provides, to the desktop appliance, access to a resource requested by the user. In another aspect, a trusted component provides, to a user of a desktop appliance, access to secure desktop functionality provided by a remote machine.
11 Citations
20 Claims
-
1. A method for authenticating, by a trusted component, a user of a desktop appliance to a remote machine, the method comprising:
-
receiving, by a desktop appliance, a secure attention sequence from a user, wherein the secure attention sequence is one of;
a first key combination of a control key, an alt key, and a delete key, a second key combination including a menu key, or a third key combination including an operating system specific meta key;invoking, responsive to receiving the secure attention sequence from the user, execution by the desktop appliance of a user interaction component, wherein the desktop appliance passes control over display and input focus to the user interaction component; receiving, by the invoked user interaction component, via the control passed, authentication credentials associated with the user; receiving, by the user interaction component executed by the desktop appliance, a request for access to a hosted resource executing remotely from the desktop appliance, the hosted resource presented to the user as a resource executing locally to the desktop appliance; transmitting, by the desktop appliance, to a broker service, the received authentication credentials; authenticating, by the broker service, the user, responsive to the received authentication credentials; transmitting, by the broker service, to a remote machine, authentication data associated with the received authentication credentials; authenticating, by the remote machine, the user, responsive to the received authentication data; and providing, by the remote machine, to the desktop appliance, access to the hosted resource. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method for authenticating, by a trusted component, a user of a desktop appliance to a remote machine, the method comprising:
-
receiving, by a desktop appliance, a secure attention sequence from a user, wherein the secure attention sequence is one of;
a first key combination of a control key, an alt key, and a delete key, a second key combination including a menu key, or a third key combination including an operating system specific meta key;invoking, responsive to receiving the secure attention sequence from the user, execution by the desktop appliance of a user interaction component, wherein the desktop appliance passes control over display and input focus to the user interaction component; receiving, by the invoked user interaction component, via the control passed, authentication credentials associated with the user; receiving, by the user interaction component executed by the desktop appliance, a request for access to a hosted resource executing remotely and presented to the user as a resource executing locally; authenticating, by the user interaction component, the user, responsive to the received authentication credentials; transmitting, by the desktop appliance, to a broker service, authentication data associated with the received authentication credentials; transmitting, by the broker service, to a remote machine, authentication data associated with the received authentication credentials; authenticating, by the remote machine, the user, responsive to the received authentication data; and providing, by the remote machine, to the desktop appliance, access to the hosted resource. - View Dependent Claims (7, 8, 9, 10, 11, 12)
-
-
13. A system for authenticating, by a trusted component, a user of a desktop appliance to a remote machine comprising:
-
a user interaction component executed by a desktop appliance configured to receive a secure attention sequence and, responsive to receiving the secure attention sequence, invoke the user interaction component, wherein the desktop appliance passes control over display and input focus to the user interaction component, and the invoked user interaction component receives authentication credentials associated with a user via the passed control, and wherein the secure attention sequence is one of;
a first key combination of a control key, an alt key, and a delete key, a second key combination including a menu key, or a third key combination including an operating system specific meta key;a broker service executing on a broker server, configured to receive the authentication credentials and authenticate the user; and a remote machine configured to receive, from the broker service, authentication data associated with the received authentication credentials, authenticate the user responsive to the received authentication data, establish a connection with the desktop appliance, provide, to the desktop appliance, access to a hosted resource executing remotely from the desktop appliance and presented to the user as though the hosted resource was executing locally to the desktop appliance, wherein the user interaction component directs display, at the desktop appliance, of output data generated by the executed hosted resource executing remotely. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20)
-
Specification