IPC분류정보
국가/구분 |
United States(US) Patent
등록
|
국제특허분류(IPC7판) |
|
출원번호 |
US-0075128
(2011-03-29)
|
등록번호 |
US-8661507
(2014-02-25)
|
발명자
/ 주소 |
- Hesselink, Lambertus
- Rizal, Dharmarus
- Bjornson, Eric S.
|
출원인 / 주소 |
- Western Digital Technologies, Inc.
|
인용정보 |
피인용 횟수 :
64 인용 특허 :
104 |
초록
▼
Applications, systems and methods for securely and remotely operating a remote computer from a local computer over a network while providing seamless, firewall-compliant connectivity. Secure and remote operation includes authenticating at least one remote computer for connection to at least one comp
Applications, systems and methods for securely and remotely operating a remote computer from a local computer over a network while providing seamless, firewall-compliant connectivity. Secure and remote operation includes authenticating at least one remote computer for connection to at least one computer over the network and/or at least one local computer for connection to at least one remote computer over the network; establishing a secure connection between the at least one local computer and the at least one remote computer over the network; and integrating a desktop of at least one remote computer on a display of at least one local computer. The connections may be made over a public network, as well as through multiple firewalls without loss of functionality.
대표청구항
▼
1. A method of securely and remotely operating a remote computer from a local computer over a public network while providing firewall-compliant connectivity, said method comprising the steps of: authenticating at least one of said remote computer for connection to said local computer over the public
1. A method of securely and remotely operating a remote computer from a local computer over a public network while providing firewall-compliant connectivity, said method comprising the steps of: authenticating at least one of said remote computer for connection to said local computer over the public network and said local computer for connection to said remote computer over the public network;establishing a secure connection between said local computer and said remote computer over the public network by establishing a private-to-public-to-private communications tunnel, wherein a connection server routes communications from said local computer through a first firewall compliant connection and a second firewall compliant connection to said remote computer, and from said remote computer through said second firewall compliant connection to said local computer through said first firewall compliant connection to said local computer;integrating a desktop of said remote computer on a display of said local computer, wherein said desktop as shown on said remote computer upon said integrating is displayed on said display of said local computer; andoperating said remote computer from said local computer, by manipulating the desktop in a manner the same as a manner used when operating the remote computer locally;wherein said operating comprises at least one of: operating a mouse pointer or cursor of said remote computer by operating a mouse of said local computer; or operating a keyboard of said remote computer by operating a keyboard of said local computer using said keyboard of said local computer or an alternative device that said local computer uses to enter keystrokes on said local computer. 2. The method of claim 1, wherein said establishing a secure connection comprises establishing a firewall compliant connection between said local computer and said remote computer over the public network wherein the local computer is protected by a local firewall element, and said remote computer is protected by a remote firewall element, each said firewall element adapted to protect each said computer from hostile intrusion from the public network, respectively. 3. The method of claim 1, further comprising operating a plurality of remote computers from said local computer by similarly integrating a desktop from each of said plurality of remote computers. 4. The method of claim 1, wherein said establishing a secure connection further comprises: centrally authenticating, at a location having a public address, the local computer wherein the local computer has a local firewall protected private address;creating said first firewall compliant connection between said connection server and said local computer upon authentication of said local computer; andestablishing said second firewall compliant connection between said connection server and said remote computer having a remote firewall protected private address. 5. A method of securely and remotely operating a remote computer from a local computer over a network while providing firewall-compliant connectivity, said method comprising the steps of: authenticating at least one of said remote computer for connection to said local computer over the network and said local computer for connection to said remote computer over the network;establishing a secure connection between said local computer and said remote computer over the network by establishing a private-to-public-to-private communications tunnel, wherein a connection server routes communications from said local computer through a first firewall compliant connection and a second firewall compliant connection to said remote computer, and from said remote computer through said second firewall compliant connection to said local computer through said first firewall compliant connection to said local computer;integrating a desktop of said remote computer on a display of said local computer, wherein said desktop as shown on said remote computer upon said integrating is displayed on said display of said local computer; andoperating said remote computer from said local computer, by manipulating the desktop in a manner the same as a manner used when operating the remote computer locally;wherein said operating comprises at least one of: operating a mouse pointer or cursor of said remote computer by operating a mouse of said local computer; or operating a keyboard of said remote computer by operating a keyboard of said local computer using said keyboard of said local computer or an alternative device that said local computer uses to enter keystrokes on said local computer. 6. The method of claim 5, wherein said desktop is fully functional on the display of said local computer, wherein said manipulating said desktop locally causes operation of said remote computer as if said remote computer were being locally operated. 7. The method of claim 5, wherein said remote and local computers connect to the network through firewalls, respectively. 8. The method of claim 5, wherein said authenticating is carried out at a location having a public address. 9. The method of claim 5, wherein said establishing a secure connection comprises: creating a first firewall compliant connection between said connection server and said local computer upon authentication of said local computer;establishing said second firewall compliant connection between said connection server and said remote computer, wherein said remote computer has a remote firewall protected private address. 10. A method of accessing and using at least one remote computer from a local computer over a public network, said method comprising the steps of: centrally authenticating, at a location having a public address, a first computer having a first, firewall protected private address;creating a first firewall compliant connection between a publicly addressed connection server and said first computer upon authentication of said first computer;establishing a second firewall compliant connection between said publicly addressed connection server and a second computer having a second firewall protected private address;establishing a private-to-public-to-private communications tunnel, wherein said connection server routes communications from said first computer through said first firewall compliant connection and said second firewall compliant connection to said second computer, and from said second computer through said second firewall compliant connection and said first firewall compliant connection to said first computer; andperforming at least one further step selected from the group consisting of: integrating a file structure of accessible files accessed at said second or first computer, into a file structure contained at said first or second computer, respectively; at least one of integrating a desktop of said second computer on a display of said first computer, wherein said desktop as shown on said second computer upon said integrating is displayed on said display of said first computer; and integrating a desktop of said first computer on a display of said second computer, wherein said desktop as shown on said first computer upon said integrating is displayed on said display of said second computer; andoperating said second computer from said first computer or said first computer from said second computer, wherein the computer that is operated is selected from the group consisting of: home appliances, video equipment, audio equipment, printers, fax machines, office equipment, medical devices, vehicles, cameras, RFID equipment, laboratory equipment, manufacturing machinery, GPS equipment, and devices having one or more embedded microprocessors. 11. The method of claim 10, further comprising authenticating and establishing at least one additional secure connection with at least a third computer and the connection server, wherein said access and use and said at least one further step may be carried out point to multipoint, from one of the connected computers to a plurality of remaining connected computers.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.