System and method for secure remote access
First Claim
1. A method for remote secure access of a user to a service on a server computer, the method comprising:
- (a) at a client device, obtaining, from the server computer or a third party server computer, an authorization software and an input information to the authorization software;
(b) separating authentication and authorization processes, comprising excluding service access privileges from the authenticating process and transferring the privileges to the authorization process, comprising;
(i) authenticating at least one of;
a user;
or the user and the client device, comprising;
verifying identity thereof, without providing the access of the user to the service;
(ii) upon successful authenticating, authorizing access of the user to the service, comprising;
(ii-1) establishing an authorization connection between the client device and the server computer;
(ii-2) at the server computer, detecting the authorization connection, and creating a blocking process to block access of the user to the service on the server computer;
(ii-3) executing the authorization software on the client device and the server computer or the third party server computer with the input information obtained in the step (a); and
(ii-4) provided an output from the authorization software on the client device and the server computer or the third party server computer is the same, terminating the blocking process on the server computer, thereby allowing the access of the user to the service on the service computer.
3 Assignments
0 Petitions
Accused Products
Abstract
System, method, and apparatus for providing access to remote computing services are described. The method includes authenticating a user and a client device; establishing a connection to a server computer including: a server program executing on the server computer detecting the connection; the server program creating a blocking process on the server computer to block access of the user to a service on the connection, authorizing, using a client program executing on the client device and the server program, the user to use the service on the server computer including: terminating the blocking process, the user using the service; and the user closing the connection to the server computer. Embodiments of the present invention provide secure remote access to computing services.
43 Citations
22 Claims
-
1. A method for remote secure access of a user to a service on a server computer, the method comprising:
-
(a) at a client device, obtaining, from the server computer or a third party server computer, an authorization software and an input information to the authorization software; (b) separating authentication and authorization processes, comprising excluding service access privileges from the authenticating process and transferring the privileges to the authorization process, comprising; (i) authenticating at least one of; a user;
or the user and the client device, comprising;verifying identity thereof, without providing the access of the user to the service; (ii) upon successful authenticating, authorizing access of the user to the service, comprising; (ii-1) establishing an authorization connection between the client device and the server computer; (ii-2) at the server computer, detecting the authorization connection, and creating a blocking process to block access of the user to the service on the server computer; (ii-3) executing the authorization software on the client device and the server computer or the third party server computer with the input information obtained in the step (a); and (ii-4) provided an output from the authorization software on the client device and the server computer or the third party server computer is the same, terminating the blocking process on the server computer, thereby allowing the access of the user to the service on the service computer. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 18)
-
-
12. A system for remote secure access of a user to a service on a server computer, the system comprising:
-
a client device having a processor; a server computer; and computer readable instructions stored in a memory of the client device and the server computer, causing; (a) the client device to obtain, from the server computer or a third party server computer, an authorization software and an input information to the authorization software; (b) the server computer and the client device to separate authentication and authorization processes, comprising excluding service access privileges from the authenticating process and transferring the privileges to the authorization process, comprising; (i) authenticating at least one of; a user;
or the user and the client device, comprising;verifying identity thereof, without providing the access of the user to the service; (ii) upon successful authenticating, authorizing access of the user to the service, comprising; (ii-1) establishing an authorization connection between the client device and the server computer; (ii-2) at the server computer, detecting the authorization connection, and creating a blocking process to block access of the user to the service on the server computer; (ii-3) executing the authorization software on the client device and the server computer or the third party server computer with the input information obtained in the step (a); and (ii-4) provided an output from the authorization software on the client device and the server computer or the third party server computer is the same, terminating the blocking process on the server computer, thereby allowing the access of the user to the service on the service computer. - View Dependent Claims (13, 14, 15, 16, 17, 19, 20, 21, 22)
-
Specification