WO2021066834A1 - System and method of securing access to a secure remote server and database on a mobile device - Google Patents
System and method of securing access to a secure remote server and database on a mobile device Download PDFInfo
- Publication number
- WO2021066834A1 WO2021066834A1 PCT/US2019/054497 US2019054497W WO2021066834A1 WO 2021066834 A1 WO2021066834 A1 WO 2021066834A1 US 2019054497 W US2019054497 W US 2019054497W WO 2021066834 A1 WO2021066834 A1 WO 2021066834A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- secure
- secure connection
- user
- database
- client
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0272—Virtual private networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/30—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
- H04L63/302—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information gathering intelligence information for situation awareness or reconnaissance
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/30—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
- H04L63/308—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information retaining data, e.g. retaining successful, unsuccessful communication attempts, internet access, or e-mail, internet telephony, intercept related information or call content
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/082—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying multi-factor authentication
Definitions
- the present disclosure generally relates to a system and method for reliably, securely, and affordably isolating and securing remote access to a secure cloud-based server and database, specifically, a Niche Records Management System (RMS) police database through a secured application, such as the NicheRMS application, over a secure networked connection, such as a Citrix Independent Computing Architecture (ICA) connection, wherein the law enforcement data is accessed, from a thin client device or a mobile device, and is only present within, the secured application front-end, and is never transmitted to or stored on the thin client or mobile device.
- a secured application such as the NicheRMS application
- ICA Citrix Independent Computing Architecture
- secure databases such as sensitive law enforcement databases, including any software associated with those databases
- VPN virtual private network
- a secure database system is the NicheRMS system, which stores law enforcement-related information in one central location.
- NicheRMS or other similar systems, are commonly used by police departments throughout the world. These systems, which include software, provide the ability to record data, retrieve data, and view data through a user interface at an on-premise workstation or via a VPN-enabled device.
- a VPN-enabled laptop is required to be stationed in a police officer’s vehicle while in the field to properly maintain VPN connectivity.
- the requirement for VPN connectivity limits availability to the NicheRMS system due to poor connectivity. As such, when a user loses connectivity to the VPN, the user must re-establish a VPN connection to the NicheRMS system, however, any unsaved data is lost. This requirement leads to inefficient data update processes, and it is cost prohibitive.
- Every public safety agency headquarter has one or more VPN connections to Ontario Police Technology Information Co-operative (OPTIC), the site of the shared, single NicheRMS system. These connections allow local workstations throughout Ontario to access resources from the shared NicheRMS database, such as the Ontario Sex Offender Registry (OSOR), the Canadian Police Information Centre (CPIC/CJIM), which is a database of criminal records and fingerprints, and the PKIWeb/IGSelfserve OPTIC Certificate Authority secure portals.
- the PKIWeb/IGSelfserve OPTIC Certificate Authority secure portals may be used to manage PKI credentials issued to police officers and stored on their smartcards.
- CAC common access card
- PKI personal identity verification
- the present invention solves the prior shortcomings of the current systems on the market and in use, including the inability of persons to reliably and cost-effectively access secure databases while in the field.
- the present invention discloses a new and novel system and method that implements functioning smartcard pass-through authentication to the secure database system, for example, a Citrix session, that supports both common access card (CAC) and personal identity verification (PIV).
- CAC common access card
- PIV personal identity verification
- the new system has a plethora of advantages not possible in the current systems.
- the new system provides the ability to use thin clients and mobile devices lessens the costs to the user by enabling the user to move away from Windows endpoints (desktop/laptop), which require costly updating approximately every four years.
- the new system improves overall security by preventing data from ever existing on the endpoint. Thus, if a device is lost or stolen there is no threat to loss of information or security breach is nonexistent.
- the user has flexibility of work location, and in turn better continuity of business, and productivity. As long as there is an internet connection, the system can by run. This is very important in emergency type situations where the user’s main business location may be inaccessible and the user must work from the field.
- a method for connecting to a secure database through a cloud workspace comprising, authenticating a user, the user utilizing a user device, having affirmatively authenticated the user, establishing a first secure connection between the user device and a cloud workspace; having established the first secure connection, accessing the cloud workspace having a secured application client by the user, the secured application client being a software that when launched, causes the cloud workspace to establish a second secure connection to a secure database system requiring two-factor authentication to access the secure database and having a secured application server software; having accessed the cloud workspace, launching the secured application client by the user, wherein the secured application client, when in communication with the secured application server software, disables the two-factor authentication requirement of the secure database system such that the user, having previously been affirmatively authenticated, obtains access to the secure database.
- a system for connecting a cloud workspace containing a client’s private data and systems to a secured cloud database comprising: a user device, the user device, once authenticated, forming a first secure connection to a server infrastructure; at least one cloud workspace, the cloud workspace being a virtualized operating system having a secured application client, connected to a first VLAN wherein the first VLAN is a client- dedicated segregated VLAN, and stored in at least one non-volatile memory on server infrastructure, the server infrastructure having a hypervisor, the hypervisor managing one or more cloud workspace and one or more VLAN, the server infrastructure further passing the first secure connection to the cloud workspace; the first VLAN enabling a connection to a site-to-site secure connection client, the site-to-site secure connection client establishing a second secure connection to a site-to-site secure connection server on a secure database system; the secure database system having the site-to-site secure connection server, a secured application server, and a secure database, the secure database system having a
- a server infrastructure comprising: a plurality of servers, each server comprising: one or more processor; one or more communication component, the communication component configured to accept a first secure connection from a user device to a cloud workspace, the first secure connection established by a cloud workspace client application on the user device and based at least in part on a smartcard authenticator, the communication component further configured to request a second secure connection between a site-to-site secure connection client accessed by a secured application client and a site-to- site secure connection server on a secure database system having a secure database and a secured application server; one or more non-volatile memory, the non-volatile memory storing at least a cloud workspace, the cloud workspace being a virtualized operating system configured to execute the secured application client, the secured application client being computer code that when executed by a processor, causes the processor to establish the second secure connection to the secure database system and remove the two-factor authentication requirement from the secure database system by causing the secured application server computer code to be executed; one or more modem
- a secure device comprising: a wireless transceiver; a microprocessor coupled to the wireless transceiver; a digital storage element on element coupled to the microprocessor and storing logic that when executed by the microprocessor causes the microprocessor to: receive a request to connect to a secured database from a secured application on a cloud server workspace; route the request to the wireless transceiver; enable the wireless transceiver to transmit the request to one or more secured database servers; receive a response from the wireless transceiver from the one or more secured database servers for authentication; generate a request to the secured application for authentication; route the request for authentication to the secured application; receive a response from the secured application that its monitoring function is disabled; route the response to the wireless transceiver; enable the wireless transceiver to transmit the response to one or more secured database servers; receive a response from the wireless transceiver from the one or more secured database for two-factor authentication.
- FIG. 1 is a diagram of an exemplary embodiment of a system of securing access to a secure remote server and database.
- FIG. 2 is a flow chart of an exemplary embodiment of a user authentication and remote access process of the present invention.
- qualifiers like “substantially,” “about,” “approximately,” and combinations and variations thereof, are intended to include not only the exact amount or value that they qualify, but also some slight deviations therefrom, which may be due to computing tolerances, computing error, manufacturing tolerances, measurement error, wear and tear, stresses exerted on various parts, and combinations thereof, for example.
- Circuitry may be analog and/or digital components, or one or more suitably programmed processors (e.g., microprocessors) and associated hardware and software, or hardwired logic. Also, “components” may perform one or more functions.
- the term “component,” may include hardware, such as a processor (e.g., microprocessor), an application specific integrated circuit (ASIC), field programmable gate array (FPGA), a combination of hardware and software, and/or the like.
- processor as used herein means a single processor or multiple processors working independently or together to collectively perform a task.
- Software may include one or more computer readable instructions that when executed by one or more components cause the component to perform a specified function. It should be understood that the algorithms described herein may be stored on one or more non- transitory computer readable medium. Exemplary non-transitory computer readable mediums may include random access memory, read only memory, flash memory, and/or the like. Such non-transitory computer readable mediums may be electrically based, magnetically based, optically based, and/or the like.
- a network switch is a network device configured to connect one or more devices together to form a computer network, thereby enabling the transfer of data from a first connected device to a second connected device.
- a network switch may provide a plurality of network interfaces, such as Ethernet, Fibre Channel, RapidIO, ATM, ITU-T G.hn and 802.11.
- a network switch may operate at one or more layer, including layer 1, layer 2, layer 3, layer 4, or layer 7.
- a network switch may include an unmanaged switch, a managed switch, including enterprise managed switch, and/or a smart (or intelligent) switch.
- top, bottom, front, rear, left, right, upper, lower, and the like as used herein are used for descriptive purposes and not necessarily for describing specific positions. The terms so used are interchangeable under appropriate circumstances and the embodiments described herein can operate in orientations other than described or illustrated herein.
- client is used to refer to a company, business, organization, sole individual who may utilize the system in its day to day business-type activities, while a “user” as used herein is the individual using the system.
- the secure access system 100 generally consists of one or more client device 104, such as a client workstation 104a or a mobile device 104b, that forms a first secure connection 108 to a server infrastructure 112, which, in turn, forms a second secure connection 116 to a secure database system 120.
- client device 104 authenticates user credentials utilizing a smartcard authenticator 124.
- smartcard authenticator 124 authenticates smartcard credentials from a smartcard reader 128 reading a smartcard 132.
- the smartcard authenticator 124 authenticates smartcard derived credentials 136.
- the user is provided access to a cloud workspace client application 140.
- the cloud workspace client application 140 then forms the first secure connection 108 to the server infrastructure 112.
- the smartcard derived credentials 136 are stored on the mobile device 104b.
- Citrix Workspace (Citrix Systems, Inc., Fort Lauderdale, FL) uses the smartcard derived credentials 136 and a user personal identification number (PIN) to authenticate the user and unlock the credentials.
- the client workstation 104a may include, but is not limited to, a desktop computer, a desktop terminal, or a laptop computer.
- the mobile device 104b may include, but is not limited to, a cell phone, a personal data assistant (PDA), a tablet, or a laptop computer.
- PDA personal data assistant
- the client device 104 is any of a number of endpoints and/or operating systems including a desktop, laptop, tablet, mobile device, thin client, iOS (Apple Inc., Cupertino, CA), Android (Google LLC, Mountain View, CA), Windows (Microsoft Corporation, Redmond, WA), MAC (Apple Inc., Cupertino, CA), Linux, or any other types of endpoints and/or operating systems known in the art, or which may offer the same functionality as the endpoints and operating systems identified herein.
- iOS Apple Inc., Cupertino, CA
- Android Google LLC, Mountain View, CA
- Windows Microsoft Corporation, Redmond, WA
- MAC Apple Inc., Cupertino, CA
- Linux any other types of endpoints and/or operating systems known in the art, or which may offer the same functionality as the endpoints and operating systems identified herein.
- the first secure connection 108 may be a virtual private network connection (VPN).
- the first secure connection 108 may utilize one or more encryption algorithms to encrypt the connection between the client device 104 and the server infrastructure 112.
- the encryption algorithm used is determined by the connection between the cloud workspace client application 140 and the cloud workspace 152.
- the first secure connection 108 is a dedicated connection between the client device 104 and the server infrastructure 112.
- the first secure connection 108 may connect to a first network.
- the first network is the Internet and the client devices interface with the server infrastructure via a series of web pages or through custom protocols utilized by the cloud workspace client application 140.
- the first network may be almost any type of network and may be implemented as the World Wide Web (or Internet), a local area network (LAN), a wide area network (WAN), a metropolitan network, a wireless network, a cellular network, a Global System for Mobile Communications (GSM) network, a code division multiple access (CDMA) network, a 3G network, a 4G network, an LTE network, a 5G network, a satellite network, a radio network, an optical network, a cable network, a public switched telephone network, an Ethernet network, combinations thereof, and/or the like. It is conceivable that in the near future, embodiments of the present disclosure may use more advanced networking topologies.
- the first secure connection is established through a firewall, such as, but not limited to, a 2xMeraki MX250 provided by Cisco Systems, San Jose, California.
- the server infrastructure 112 accepts the first secure connection 108 based, at least in part, on the user credentials authenticated by the smartcard authenticator 124.
- the server infrastructure 112 may include at least a gateway, a firewall, a router, and a user authenticator. In one embodiment, the server infrastructure 112 compares the user credentials against the user authenticator to determine one or more systems to which the user has authorization to access.
- the server infrastructure 112 connects the user to a cloud service system 144.
- the cloud service system 144 connects the user to a segregated VLAN 148 based at least in part on the user credentials and/or the user authenticator and hosts the cloud workspace 152 that is connected to the segregated VLAN 148.
- the server infrastructure 112 is a hyper-converged infrastructure (HCI), which virtualizes all of the elements of conventional “hardware- defined” systems (i.e., a private cloud infrastructure). This is, all components contained within the server infrastructure 112, including the cloud service system 144, the segregated VLAN 148, the second segregated VLAN 148-2, the cloud workspace 152, the secured application client 156, the site-to-site secure connection client 160 and any other component operating on the server infrastructure 112 may be virtualized.
- the HCI is a four node 2U hyper-converged compute and storage cluster, such as a Nutanix acropolis hypervisor provided by Nutanix, San Joes, California.
- Storage within the HCI may be a hybrid of flash and mechanical self-encrypting drives that store hot and cold data respectively. This ensures that all data at rest and in transit is encrypted, end-to-end, creating a private cloud.
- the HCI may host multiple segregated VLAN 148, 148-2 where each VLAN provides the ability to segregate private data of various clients and services.
- the server infrastructure 112 includes a backup VLAN, that is, a segregated VLAN network that allows a backup software appliance virtual machine access to the HCI for block level backups to a hyper-converged storage backup appliance.
- the backup software appliance in the backup VLAN prevents loss of data associated, such as that associated with corruption of the data or destruction of the hardware.
- the backup software appliance virtual machine is provided by HYCU, Boston, Massachusetts and the hyper-converged storage backup appliance is provided by ExaGrid, Westborough, Massachusetts.
- the hyper-converged infrastructure as opposed to other general- purpose cloud service providers such as Microsoft Azure (Microsoft Corporation, Redmond, WA) or Amazon Web Services (AWS, Amazon Web Services, Inc., Seattle, WA), the server infrastructure 112 further maintains security by controlling what services and connections have access to the server infrastructure 112.
- the segregated VLAN 148 is a virtual local area network formed within a local area network (LAN) such that the user accessing the segregated VLAN 148 only has access to resources connected to the segregated VLAN 148 but not to other resources connected to the LAN or other segregated VLANs.
- LAN local area network
- a user is connected to only a first segregated VLAN on a LAN
- a server is connected to only a second segregated VLAN on the LAN
- a storage device is connected to only the LAN
- the user would be unable to access the server or the storage device; likewise, neither the server nor the storage device would be able to connect to the user.
- the cloud service system 144 is a virtual cloud service system hosted on the server infrastructure 112.
- the virtual cloud service system may be one or more application or one or more virtual machine configured to execute one or more application that is executed on at least one physical computer having at least one processor.
- the virtual machine includes virtualized computer hardware hosted on one or more non-virtualized computer hardware.
- Computer hardware may include one or more processor, non-volatile memory, and/or a communication component.
- the segregated VLAN 148 operates on non-virtualized hardware, such as a hardware component of the server infrastructure 112.
- the segregated VLAN 148 operates on virtualized hardware such as a virtualized communication component and/or a virtualized switch.
- the segregated VLAN 148 operates on both at least one non-virtualized hardware and at least one virtualized hardware.
- the cloud service system 144 may host one or more segregated VLAN 148, such as segregated VLAN 148-2.
- the cloud service system 144 includes one or more of a Citrix Hypervisor, formerly XenServer, a Citrix Gateway Service, and/or a Netscaler Service (Citrix Systems, Inc, Fort Lauderdale, Florida).
- the cloud workspace 152 is a virtual cloud workspace, that is, the cloud workspace 152 is virtualized on the server infrastructure 112.
- the cloud workspace 152 hosts a secure application client 156.
- the secure application client 156 is a computer application executed by one or more processer of the cloud workspace 152.
- the secure application client 156 is a computer application running within a virtualized container.
- the segregated VLAN 148 connects more than one cloud workspace 152 and each of the cloud workspaces 152 is a cloned Microsoft Server 2016 Virtual Machine from a Citrix Master Image, which is configured to the client’s specifications and requirements and pre-loaded with any applications required by that particular client to properly function.
- All updates are completed on the Virtual Machine whereby the Virtual Machine is shut down, a Snapshot is taken of the current state of the Virtual Machine and then cloned to the number of cloud workspaces 152 required for the size of the client including a minimum of two running and registered cloud workspaces 152.
- the cloud workspaces 152 power on and register with the cloud service system 144 such that they are ready to accept logins from at least one client.
- all work performed by the client on secured database 172 is completed through the cloud workspace 152.
- the cloud workspaces 152 are disposable, that is, they destroy themselves daily and are recreated when the user forms a new first secure connection 108, thereby ensuring the cloud workspace 152 maintains integrity by reverting any configurations made by the user to a default state defined by the state of the virtual machine when it was most recently formed.
- the cloud workspace 152 is enabled by XenApp and XenDesktop services, provided by Citrix Systems, Inc, Fort Lauderdale, Florida.
- the secured application client 156 forms the second secure connection 116 to the site-to-site secure connection client 160.
- the site-to-site secure connection client 160 is the only connection client that can form the second secure connection 116 to a site-to-site secure connection server 164 on the secure database system 120.
- the site-to-site secure connection server 164 will reject any attempt to form the second secure connection 116 if the second secure connection 116 does not originate from a pre-determined device.
- the pre-determined device may be limited by the IP address of the pre-determined device, including either the IPv4 or the IPv6 address, and/or the MAC address of the pre-determined device, that is the media access control address.
- the user can access a secured application server 168 with the secured application client 156. The user can then utilize the connection to the secured application server 168 to connect to a secured database 172.
- the second secure connection 116 may be a virtual private network connection (VPN).
- the second secure connection 116 may utilize one or more encryption algorithms to encrypt the connection between the site-to-site secure connection client 160 and the site-to- site secure connection server 164.
- the one or more encryption algorithms may include, for example only, IPSec (IETF, LLC, Reston, Virginia) and/or OpenTLS (OpenSSL Software Foundation, Newark, DE).
- the second secure connection 116 is a dedicated connection between the site-to-site secure connection client 160 and the site-to-site secure connection server 164.
- the second secure connection 116 may connect to a second network.
- the second network is the Internet and the site-to-site secure connection client 160 interfaces with the site-to-site secure connection server 164 via a series of web pages or through custom protocols utilized by the site-to-site secure connection server 164.
- the second network may be almost any type of network and may be implemented as the World Wide Web (or Internet), a local area network (LAN), a wide area network (WAN), a metropolitan network, a wireless network, a cellular network, a Global System for Mobile Communications (GSM) network, a code division multiple access (CDMA) network, a 3G network, a 4G network, an LTE network, a 5G network, a satellite network, a radio network, an optical network, a cable network, a public switched telephone network, an Ethernet network, combinations thereof, and/or the like.
- GSM Global System for Mobile Communications
- CDMA code division multiple access
- the second network is the same as the first network.
- the second secure connection is established through a firewall, such as, but not limited to, a 2xMeraki MX250 provided by Cisco Systems, San Jose, California.
- any data on the secured database 172 is not copied or saved locally to the client device 104.
- the network architecture disclosed above and in FIG. 1 prevent access to the secured database 172 by unauthorized users who may have access to one or more client device 104 through either innocent or nefarious means, even if the unauthorized user has root or administrator access to the client device 104.
- the site-to-site secure connection client 160 connection information is not known by or stored on the client device 104 thereby preventing unauthorized users from determining connection information for the second secure connection even if the unauthorized user has access to the client device 104.
- connection to the secured database 172 is formed with the secured application client 156 on the cloud workspace 152, if the client device 104, being either the client workstation 104a or the mobile device 104b, loses connection to the server infrastructure 112, the connection to the secure database system 120 would not be reset and all work done on the cloud workspace 152 would not be lost as it would still be available when the client connects to the server infrastructure 112 the next time.
- the system connects various platforms together in a way that maintains a secure and reliable cloud-based connection when utilizing a NicheRMS application server 204 (secured application server 168), thus protecting the integrity of the data stored on the NicheRMS database 212 and exchanged over the one or more cloud-based connections.
- a NicheRMS application server 204 secured application server 168
- FIG. 2 shown therein is a secure application server connection diagram 200.
- the secure application server connection diagram 200 to enable a user to access the NicheRMS application server 204 through the cloud workspace 152 utilizing the client device 104, the user must use the smartcard 132 with the smartcard reader 128 which is connected directly to the client device 104 (e.g., desktop, laptop, tablet, mobile device, thin client, etc.).
- client device 104 e.g., desktop, laptop, tablet, mobile device, thin client, etc.
- the smartcard authenticator 124, the smartcard reader 128, and the smartcard 132 enable the user to authenticate over a cloud workspace session started by the cloud workspace client application 140 to the cloud workspace 152.
- the authentication process commences when the user launches the cloud workspace client application 140, which launches the smartcard authenticator 124.
- the smartcard authenticator 124 instructs the user to insert the smartcard 132 into the smartcard reader 128.
- the smartcard authenticator 124 reads, via the smartcard reader 128, the user credentials stored on the smartcard 132 and completes the authentication process on behalf of the cloud workspace client application 140.
- the smartcard authenticator 124 is the Entrust Datacard (Entrust Datacard Corporation, Minneapolis, MN) smartcard application. In another embodiment, the smartcard authenticator 124 is software or firmware integrated into the smartcard reader 128.
- the NicheRMS application client 208 is running in the cloud workspace 152. Therefore, if the first secure connection 108 is closed between the client device 104 and the cloud workspace 152, the NicheRMS application client 208 continues running unaffected in the cloud workspace 152. In the case that the first secure connection 108 is closed, the user simply has to re-establish the first secure connection 108 between the client device 104 and the cloud workspace 152 and continue working within the virtual desktop environment on the cloud workspace 152 where the user left off when the connection was closed, thus avoiding data integrity issues and reducing the chance of repeating work that may not have been saved within the NicheRMS database 212.
- a two-factor authentication process is completed using derived credentials, which, through an enrollment process, are derived from the user credentials located on the smartcard 132, and permanently stored on a mobile device for subsequent authentication when the user launches the cloud workspace client application 140.
- the remainder of the authentication and remote access process is identical to the process described above when using the smartcard reader connected to the client device 104.
Abstract
Description
Claims
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU2019469058A AU2019469058A1 (en) | 2019-10-03 | 2019-10-03 | System and method of securing access to a secure remote server and database on a mobile device |
PCT/US2019/054497 WO2021066834A1 (en) | 2019-10-03 | 2019-10-03 | System and method of securing access to a secure remote server and database on a mobile device |
CA3074371A CA3074371A1 (en) | 2019-10-03 | 2019-10-03 | System and method of securing access to a secure remote server and database on a mobile device |
GB2204776.5A GB2603672A (en) | 2019-10-03 | 2019-10-03 | System and method of securing access to a secure remote server and database on a mobile device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/US2019/054497 WO2021066834A1 (en) | 2019-10-03 | 2019-10-03 | System and method of securing access to a secure remote server and database on a mobile device |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2021066834A1 true WO2021066834A1 (en) | 2021-04-08 |
Family
ID=68290388
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2019/054497 WO2021066834A1 (en) | 2019-10-03 | 2019-10-03 | System and method of securing access to a secure remote server and database on a mobile device |
Country Status (4)
Country | Link |
---|---|
AU (1) | AU2019469058A1 (en) |
CA (1) | CA3074371A1 (en) |
GB (1) | GB2603672A (en) |
WO (1) | WO2021066834A1 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20210105267A1 (en) * | 2019-10-03 | 2021-04-08 | Fset Inc. | System and method of securing access to a secure remote server and database on a mobile device |
US11356446B1 (en) * | 2019-05-21 | 2022-06-07 | Paul Nacinovich | Medical record data card |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100250497A1 (en) * | 2007-01-05 | 2010-09-30 | Redlich Ron M | Electromagnetic pulse (EMP) hardened information infrastructure with extractor, cloud dispersal, secure storage, content analysis and classification and method therefor |
US20130061310A1 (en) * | 2011-09-06 | 2013-03-07 | Wesley W. Whitmyer, Jr. | Security server for cloud computing |
GB2541040A (en) * | 2015-08-05 | 2017-02-08 | Intralinks Inc | Systems and methods of secure data exchange |
-
2019
- 2019-10-03 CA CA3074371A patent/CA3074371A1/en active Pending
- 2019-10-03 GB GB2204776.5A patent/GB2603672A/en active Pending
- 2019-10-03 AU AU2019469058A patent/AU2019469058A1/en active Pending
- 2019-10-03 WO PCT/US2019/054497 patent/WO2021066834A1/en active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100250497A1 (en) * | 2007-01-05 | 2010-09-30 | Redlich Ron M | Electromagnetic pulse (EMP) hardened information infrastructure with extractor, cloud dispersal, secure storage, content analysis and classification and method therefor |
US20130061310A1 (en) * | 2011-09-06 | 2013-03-07 | Wesley W. Whitmyer, Jr. | Security server for cloud computing |
GB2541040A (en) * | 2015-08-05 | 2017-02-08 | Intralinks Inc | Systems and methods of secure data exchange |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11356446B1 (en) * | 2019-05-21 | 2022-06-07 | Paul Nacinovich | Medical record data card |
US20210105267A1 (en) * | 2019-10-03 | 2021-04-08 | Fset Inc. | System and method of securing access to a secure remote server and database on a mobile device |
US11611549B2 (en) * | 2019-10-03 | 2023-03-21 | Fset Inc | System and method of securing access to a secure remote server and database on a mobile device |
Also Published As
Publication number | Publication date |
---|---|
CA3074371A1 (en) | 2021-04-03 |
GB2603672A (en) | 2022-08-10 |
GB202204776D0 (en) | 2022-05-18 |
AU2019469058A1 (en) | 2022-04-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11611549B2 (en) | System and method of securing access to a secure remote server and database on a mobile device | |
US10171432B2 (en) | Systems to implement security in computer systems | |
CN110892691B (en) | Secure execution platform cluster | |
US10560476B2 (en) | Secure data storage system | |
EP2625643B1 (en) | Methods and systems for providing and controlling cryptographically secure communications across unsecured networks between a secure virtual terminal and a remote system | |
US9740867B2 (en) | Securely passing user authentication data between a pre-boot authentication environment and an operating system | |
US10417428B2 (en) | Methods and systems for providing and controlling cryptographic secure communications terminal providing a remote desktop accessible in secured and unsecured environments | |
US9521032B1 (en) | Server for authentication, authorization, and accounting | |
US10397216B2 (en) | Systems and methods for performing secure backup operations | |
BR112014007798B1 (en) | IMPLEMENTING SECURE COMMUNICATIONS IN A SUPPORT SYSTEM | |
US9635055B2 (en) | Encryption levels for secure application containers | |
US20200374121A1 (en) | Computing system and methods providing session access based upon authentication token with different authentication credentials | |
EP3449607B1 (en) | Systems and methods for managing encryption keys for single-sign-on applications | |
WO2021066834A1 (en) | System and method of securing access to a secure remote server and database on a mobile device | |
US10887095B2 (en) | Allocating security parameter index values using time-based one-time passwords | |
US10122832B2 (en) | Communications of usernames and passwords to a plurality of cloud storages via a plurality of communications protocols that change over time | |
US11726813B2 (en) | Systems and methods for establishing scalable credential creation and access | |
EP3143724B1 (en) | Three-tiered security and computational architecture | |
US9756505B1 (en) | Systems and methods for utilizing authentication requests for on-demand provisioning of access-point accounts | |
SS et al. | A Survey Paper on Cloud Security Based on Distributed Ledgers of Blockchain | |
Al-Thobhani et al. | Cloud computing Security Solutions and Privacy. | |
Neha | A Review Paper on Various Security Issues and its Solutions in Cloud Computing | |
Mohammed et al. | A Novel Approach for Handling Security in Cloud Computing Services | |
Singh | Security Rudiments for SaaS Application Development and Deployment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 19790399 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 202204776 Country of ref document: GB Kind code of ref document: A Free format text: PCT FILING DATE = 20191003 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
ENP | Entry into the national phase |
Ref document number: 2019469058 Country of ref document: AU Date of ref document: 20191003 Kind code of ref document: A |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 19790399 Country of ref document: EP Kind code of ref document: A1 |