×

Trusted content distribution system

  • US 9,432,333 B2
  • Filed: 03/24/2011
  • Issued: 08/30/2016
  • Est. Priority Date: 03/24/2010
  • Status: Active Grant
First Claim
Patent Images

1. A method for providing for a user a secure connection between a first electronic device and a second electronic device over a communication network that may be insecure and that connects the first and second electronic devices, the secure connection being used for exchanging data while executing an application, comprising the steps of:

  • providing a first electronic device that comprises;

    memory, storing user identification information;

    a human machine interface associated with the first electronic device; and

    at least one communication port;

    said first electronic device being a zero client,providing a second electronic device configured to store, control,and execute all applications running while the first and second electronic devices are connected, and storage of all data used with the applications, and administrating the secure connection;

    providing a third electronic device comprising;

    memory, storing user identification information; and

    an initialization module;

    connecting the first electronic device with the third electronic device via the communication port;

    initializing and managing by said third electronic device operation of the first electronic device for setting-up a secure connection over said communication network with the second electronic device by a trusted boot process that boots an operating system in a random access memory of the first electronic device;

    managing every interface of the first electronic device and the secure connection from the second electronic device, the managing comprising administrating the secure connection by the second electronic device by receiving over the secured connection the user identification information and based thereon authenticate the user, the administrating including allowing or denying access to data and/or applications stored on the second electronic device based on the security settings of the authenticated user, andexecuting the application on the second electronic device while exchanging the data over the secure connection for presentation to the user via the human machine interface of the first electronic device.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×