Techniques for providing remote computing services
First Claim
Patent Images
1. A system for providing remote computing services, comprising:
- an authentication service operable to, at least;
determine whether to provide a user device access to a virtual machine,perform an initial authentication of the user device, andtransmit a first key to the user device based at least in part on the initial authentication;
one or more computing devices located remotely from the user device and collectively operable to, at least;
receive the first key from the user device, andauthenticate the user device as authorized to access the virtual machine using the received first key;
a messaging service operable to, at least;
transmit a second key to the user device, the second key usable to access the virtual machine, wherein the one or more computing devices are collectively operable to receive the second key, and wherein the second key is generated using a key-generation algorithm; and
a remote computing service operable to, at least;
receive the second key from the user device, andauthenticate the user device as authorized to access the virtual machine, based at least in part on both the received first key and the received second key.
1 Assignment
0 Petitions
Accused Products
Abstract
Techniques, including systems and methods, for providing access to remote computing services are described and suggested herein. In an embodiment, a first computer system provides a key to a user device over a network. The user device provides the received key to a second computer system that uses the key to authenticate the user device. The second computer system executes an operating system for the user device according to instructions received from the user device. Results of execution of the operating system are provided to the user device.
49 Citations
25 Claims
-
1. A system for providing remote computing services, comprising:
-
an authentication service operable to, at least; determine whether to provide a user device access to a virtual machine, perform an initial authentication of the user device, and transmit a first key to the user device based at least in part on the initial authentication; one or more computing devices located remotely from the user device and collectively operable to, at least; receive the first key from the user device, and authenticate the user device as authorized to access the virtual machine using the received first key; a messaging service operable to, at least; transmit a second key to the user device, the second key usable to access the virtual machine, wherein the one or more computing devices are collectively operable to receive the second key, and wherein the second key is generated using a key-generation algorithm; and a remote computing service operable to, at least; receive the second key from the user device, and authenticate the user device as authorized to access the virtual machine, based at least in part on both the received first key and the received second key. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. One or more computer-readable storage media having collectively stored thereon instructions for causing a computer system to perform a method, the computer system including a first subsystem and a second subsystem, the method comprising:
-
determining whether to provide a user device with access to a virtual machine; transmitting, by the first subsystem and responsive to the determination to provide the user device with access to the virtual machine, a first key to the user device, the first key transmitted to the user device based at least in part on an initial authentication of the user device; receiving, by the second subsystem, the first key from the user device; receiving, by the second subsystem, a second key from the user device, the second key usable to access the virtual machine, wherein the second key is generated using a key-generation algorithm; and authenticating, by the second subsystem, the user device as authorized to access the virtual machine using the received first key and the second key. - View Dependent Claims (9, 10, 11, 12)
-
-
13. A user device for accessing a remote computing service, comprising:
-
at least one processor; and memory, including instructions executable by the at least one processor that cause the user device to, at least; provide information based at least in part on information embedded in the user device to a first computer system; receive, from the first computer system, a first key, the first key received at the user device after a determination to provide the user device with access to a virtual machine is performed by the first computer system, the determination based at least in part on data derived from the information embedded with the user device; receive a second key, the second key generated using a key-generation algorithm to allow the user device access one or more applications provided by the virtual machine; and provide the first key and the second key to a second computer system for authentication of the user device by the second computer system as authorized to access the virtual machine. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20)
-
-
21. A computer-implemented method, comprising:
under the control of one or more computer systems configured with executable instructions, determining, at an authentication service, whether to provide access to a remote computing service distinct from the authentication service, the remote computing service configured to maintain virtual machines corresponding to authorized user devices; receiving, at the remote computing service, a request for access to the remote computing service from a user device, the request for access including an access key and a second key provided by the user device, the access key provided by the authentication service, wherein the second key is generated using a key-generation algorithm; authenticating, at the remote computing service, based at least in part on the received information, the user device as authorized to access at least one virtual machine maintained by the remote computing service; at a time after the user device is authenticated, receiving, at the authentication service, a request for an acquaintance key; authenticating, based at least in part on the acquaintance key, an acquaintance device as authorized to access the at least one virtual machine; and at a time after the acquaintance device is authenticated, granting access to the at least one virtual machine. - View Dependent Claims (22, 23, 24, 25)
Specification