Invention Grant
US08387124B2 Wormhole devices for usable secure access to remote resource 有权
蠕虫孔设备可用于远程资源的安全访问

Wormhole devices for usable secure access to remote resource
Abstract:
A token has a memory, an interface allow connection to a host, and a processor. The processor, in response to user input for configuring a remote access connection, executes a first set of processing instructions to establish a trusted connection with the server host, exchanges credentials over the trusted connection to establish a secure connection with the server host over an untrusted connection, and defines configuration information for accessing user selected data or services. The processor, in response to user input received in a legacy environment, executes a second set of processing instructions that includes establishing, over an untrusted connection, a secure connection with the server host using the security credentials, configuring the secure connection for access to the data or services, making the data or services available in the legacy environment, and defends against attempted access to data or services available at the token other than the data or services made available in the legacy environment.
Public/Granted literature
Information query
Patent Agency Ranking
0/0