Abstract: Disclosed is a system for deploying a secure server that provides one or more network services. Generally stated, a secure server is deployed in a secure environment behind a privacy barrier. The secure server is configured to interact with a service host on a public network outside the privacy barrier. The service host facilitates routing information from the public network through the privacy barrier to the secure server.
Abstract: In accordance with this disclosure, a system and method for remotely enabling proximity-based authentication is provided. A computing device initiates a secure server based on proximity-based communication when the computing device is in a vicinity of the secure server. The computer device then prompts proximity-based authentication to establish a secure connection with the secure server. As a result of the proximity-based authentication, the computing device is authenticated and locally stores a secure token sent from the secure server in response to the proximity-based authentication. Once the authenticated computing device communicates with the secure server, remote authentication is initiated to the secure server and the authenticated computing device is remotely connected to the secure server if the stored secure token is properly accepted by the secure server for authentication.
Abstract: Disclosed is a system for deploying a secure server that provides one or more network services. Generally stated, a secure server is deployed in a secure environment behind a privacy barrier. The secure server is configured to interact with a service host on a public network outside the privacy barrier. The service host facilitates routing information from the public network through the privacy barrier to the secure server.
Abstract: In accordance with this disclosure, a system and method for remotely enabling proximity-based authentication is provided. A computing device initiates a secure server based on proximity-based communication when the computing device is in a vicinity of the secure server. The computer device then prompts proximity-based authentication to establish a secure connection with the secure server. As a result of the proximity-based authentication, the computing device is authenticated and locally stores a secure token sent from the secure server in response to the proximity-based authentication. Once the authenticated computing device communicates with the secure server, remote authentication is initiated to the secure server and the authenticated computing device is remotely connected to the secure server if the stored secure token is properly accepted by the secure server for authentication.