Login authentication using a trusted device
A user working on a client computer is allowed to remotely login to a server over a computer network. A first secure connection is established between the client and the server. Communications with a trusted device which is in the user's control is established via a communication channel betwee...
Saved in:
Main Authors | , |
---|---|
Format | Patent |
Language | English |
Published |
03.07.2012
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | A user working on a client computer is allowed to remotely login to a server over a computer network. A first secure connection is established between the client and the server. Communications with a trusted device which is in the user's control is established via a communication channel between the trusted device and the client, where this channel is not part of the network. A second secure connection is established between the trusted device and the server through the client, where this second secure connection is tunneled within the first secure connection. The user remotely logs into the server over the second secure connection using the trusted device. |
---|---|
Bibliography: | Application Number: US20080198914 |