SYSTEMS AND METHODS FOR SECURE HANDLING OF SECURE ATTENTION SEQUENCES
First Claim
1. A method for authenticating, by a trusted component, a user of a desktop appliance to a remote machine, the method comprising:
- executing, by a desktop appliance, a user interaction component, responsive to receiving a secure attention sequence from a user;
receiving, by the user interaction component, authentication credentials associated with the user;
receiving, by the user interaction component executed by the desktop appliance, a request for access to a hosted resource executing remotely and presented to the user as a resource executing locally;
transmitting, by the desktop appliance, to a broker service, the received authentication credentials;
authenticating, by the broker service, the user, responsive to the received authentication credentials;
transmitting, by the broker service, to a remote machine, authentication data associated with the received authentication credentials;
authenticating, by the remote machine, the user, responsive to the received authentication data; and
providing, by the remote machine, to the desktop appliance, access to the hosted resource.
7 Assignments
0 Petitions
Accused Products
Abstract
A method for authenticating, by a trusted component, a user of a desktop appliance to a remote machine includes executing, by a desktop appliance, a user interaction component, responsive to receiving a secure attention sequence from a user. The user interaction component receives authentication credentials associated with the user. The desktop appliance transmits, to a broker service, the received authentication credentials. The broker service authenticates the user, responsive to the received authentication credentials. The broker service transmits, to a remote machine, authentication data associated with the received authentication credentials. The remote machine authenticates the user, responsive to the received authentication data. The remote machine provides, to the desktop appliance, access to a resource requested by the user. In another aspect, a trusted component provides, to a user of a desktop appliance, access to secure desktop functionality provided by a remote machine.
8 Citations
21 Claims
-
1. A method for authenticating, by a trusted component, a user of a desktop appliance to a remote machine, the method comprising:
-
executing, by a desktop appliance, a user interaction component, responsive to receiving a secure attention sequence from a user; receiving, by the user interaction component, authentication credentials associated with the user; receiving, by the user interaction component executed by the desktop appliance, a request for access to a hosted resource executing remotely and presented to the user as a resource executing locally; transmitting, by the desktop appliance, to a broker service, the received authentication credentials; authenticating, by the broker service, the user, responsive to the received authentication credentials; transmitting, by the broker service, to a remote machine, authentication data associated with the received authentication credentials; authenticating, by the remote machine, the user, responsive to the received authentication data; and providing, by the remote machine, to the desktop appliance, access to the hosted resource. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method for authenticating, by a trusted component, a user of a desktop appliance to a remote machine, the method comprising:
-
executing, by a desktop appliance, a user interaction component, responsive to receiving a secure attention sequence from a user; receiving, by the user interaction component, authentication credentials associated with the user; receiving, by the user interaction component executed by the desktop appliance, a request for access to a hosted resource executing remotely and presented to the user as a resource executing locally; authenticating, by the user interaction component, the user, responsive to the received authentication credentials; transmitting, by the desktop appliance, to a broker service, authentication data associated with the received authentication credentials; transmitting, by the broker service, to a remote machine, authentication data associated with the received authentication credentials; authenticating, by the remote machine, the user, responsive to the received authentication data; and providing, by the remote machine, to the desktop appliance, access to the hosted resource. - View Dependent Claims (7, 8, 9, 10, 11, 12)
-
-
13. A system for authenticating, by a trusted component, a user of a desktop appliance to a remote machine comprising:
-
a user interaction component executed by a desktop appliance and, responsive to receiving a secure attention sequence, receiving authentication credentials associated with a user; a broker service executing on a broker server, receiving the authentication credentials and authenticating the user; and a remote machine receiving, from the broker service, authentication data associated with the received authentication credentials, authenticating the user, responsive to the received authentication data, establishing a connection with the desktop appliance, and providing, to the desktop appliance, access to a hosted resource executing remotely and presented to the user as though the hosted resource was executing locally. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20)
-
-
21-40. -40. (canceled)
Specification