Processing

Please wait...

Settings

Settings

Goto Application

1. WO2020142446 - FACILITATING REMOTE ACCESS

Publication Number WO/2020/142446
Publication Date 09.07.2020
International Application No. PCT/US2019/068974
International Filing Date 30.12.2019
Chapter 2 Demand Filed 01.10.2020
IPC
H04W 12/00 2009.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
WWIRELESS COMMUNICATION NETWORKS
12Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
H04W 12/08 2009.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
WWIRELESS COMMUNICATION NETWORKS
12Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
08Access security
H04L 29/06 2006.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
29Arrangements, apparatus, circuits or systems, not covered by a single one of groups H04L1/-H04L27/136
02Communication control; Communication processing
06characterised by a protocol
H04W 12/06 2009.01
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
WWIRELESS COMMUNICATION NETWORKS
12Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
06Authentication
CPC
G06F 21/566
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
55Detecting local intrusion or implementing counter-measures
56Computer malware detection or handling, e.g. anti-virus arrangements
566Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
G06F 2221/034
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
2221Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
034Test or assess a computer or a system
G06F 8/65
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
8Arrangements for software engineering
60Software deployment
65Updates
H04L 2463/082
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
2463Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
082applying multi-factor authentication
H04L 41/0668
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
41Arrangements for maintenance or administration or management of packet switching networks
06involving management of faults or events or alarms
0654Network fault recovery
0668selecting new candidate element
H04L 41/0681
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
41Arrangements for maintenance or administration or management of packet switching networks
06involving management of faults or events or alarms
0681involving configuration of triggering conditions
Applicants
  • CITRIX SYSTEMS, INC. [US]/[US]
Inventors
  • OJHA, Nivedita
  • WILSON, Stephen
  • THORSLUND, Derek
Agents
  • RUBENSTEIN, Bruce D.
Priority Data
62/786,81331.12.2018US
Publication Language English (EN)
Filing Language English (EN)
Designated States
Title
(EN) FACILITATING REMOTE ACCESS
(FR) FACILITATION D'ACCÈS À DISTANCE
Abstract
(EN)
In one aspect, technique for performing authentication includes a first device receiving security data from a second device that shares its network connection with the first device. The first device applies the security data received from the second device when requesting authentication to a secured resource on the network. In another aspect, a technique for managing computerized access includes a first computing device that receives location information from a second computing device that shares its network connection with the first computing device. The first computing device applies the location information received from the second computing device when requesting access to a resource on the network. The first computing device thus leverages the presence of the second computing device and its location information to increase authentication strength and/or to facilitate the administration of access rights. In yet another aspect, a technique uses a managed computing device to extend management control by an organization to IoT (Internet of Things) devices in a local environment of the computing device. The computing device discovers any local IoT devices and participates in a communication with a server to bring one or more of the IoT devices under management control. In some examples, extending management control involves enrolling selected IoT devices into a management framework of the organization and directing communications between the server and the respective IoT devices through the managed device, which provides a point-of-presence for administering management of the selected IoT devices in the local environment.
(FR)
Selon un aspect, une technique permettant d'effectuer une authentification comprend un premier dispositif recevant des données de sécurité en provenance d'un second dispositif qui partage sa connexion réseau avec le premier dispositif. Le premier dispositif applique les données de sécurité reçues en provenance du second dispositif lors de la demande d'authentification à une ressource sécurisée sur le réseau. Selon un autre aspect, une technique de gestion d'accès informatisé comprend un premier dispositif informatique qui reçoit des informations de localisation en provenance d'un second dispositif informatique qui partage sa connexion réseau avec le premier dispositif informatique. Le premier dispositif informatique applique les informations de localisation reçues en provenance du second dispositif informatique lors de la demande d'accès à une ressource sur le réseau. Le premier dispositif informatique tire ainsi profit de la présence du second dispositif informatique et de ses informations de localisation pour augmenter la robustesse d'authentification et/ou pour faciliter l'administration de droits d'accès. Selon encore un autre aspect, une technique utilise un dispositif informatique géré pour étendre la commande de gestion par une organisation à des dispositifs IdO (Internet des objets) dans un environnement local du dispositif informatique. Le dispositif informatique découvre des dispositifs IdO locaux quelconques et participe à une communication avec un serveur pour amener un ou plusieurs des dispositifs IdO dans une commande de gestion. Dans certains exemples, l'extension d'une commande de gestion consiste à inscrire des dispositifs IdO sélectionnés dans un cadre de gestion de l'organisation et à diriger des communications entre le serveur et les dispositifs IdO respectifs par l'intermédiaire du dispositif géré, qui fournit un point de présence pour l'administration de la gestion des dispositifs IdO sélectionnés dans l'environnement local.
Latest bibliographic data on file with the International Bureau