Sykes Enterprises, Incorporated
Secure authentication and virtual environment setup
Last updated:
Abstract:
Disclosed are systems and methods that enable secure authentication to a network and virtual environment setup. An end point computing device combines data input by a user with stored data to determine an IP address where login credentials can be transmitted for authentication. The end point device transmits system information to a provider front end computing device for authentication. In this manner, a user identity and the end point device can be authenticated without the need to store identifying information to the end point device or communicate with a provider's secure back end network. The provider devices determine permissions data that define the user's ability to interact with the provider's network. The provider front end device transmits settings data to the end point device that is used to connect to the provider's network and establish a virtual working environment.
Utility
22 Dec 2017
11 Aug 2020