Language selection

Search

Patent 3074371 Summary

Third-party information liability

Some of the information on this Web page has been provided by external sources. The Government of Canada is not responsible for the accuracy, reliability or currency of the information supplied by external sources. Users wishing to rely upon this information should consult directly with the source of the information. Content provided by external sources is not subject to official languages, privacy and accessibility requirements.

Claims and Abstract availability

Any discrepancies in the text and image of the Claims and Abstract are due to differing posting times. Text of the Claims and Abstract are posted:

  • At the time the application is open to public inspection;
  • At the time of issue of the patent (grant).
(12) Patent Application: (11) CA 3074371
(54) English Title: SYSTEM AND METHOD OF SECURING ACCESS TO A SECURE REMOTE SERVER AND DATABASE ON A MOBILE DEVICE
(54) French Title: SYSTEME ET METHODE POUR OBTENIR L'ACCES A UN SERVEUR ET A UNE BASE DE DONNEES SECURISES A DISTANCE A PARTIR D'UN APPAREIL MOBILE
Status: Examination
Bibliographic Data
(51) International Patent Classification (IPC):
  • H04L 09/32 (2006.01)
  • H04W 12/06 (2021.01)
(72) Inventors :
  • BROWN, DAVID (Canada)
  • RIVERS, AL (Canada)
  • RIVERS, TRAVIS (Canada)
(73) Owners :
  • FSET INC.
(71) Applicants :
  • FSET INC. (United States of America)
(74) Agent: OSLER, HOSKIN & HARCOURT LLP
(74) Associate agent:
(45) Issued:
(86) PCT Filing Date: 2019-10-03
(87) Open to Public Inspection: 2021-04-03
Examination requested: 2023-06-06
Availability of licence: N/A
Dedicated to the Public: N/A
(25) Language of filing: English

Patent Cooperation Treaty (PCT): Yes
(86) PCT Filing Number: PCT/US2019/054497
(87) International Publication Number: US2019054497
(85) National Entry: 2020-03-03

(30) Application Priority Data: None

Abstracts

English Abstract


A new and novel system and method for reliably, securely, and affordably
isolating and
securing remote access to a secure cloud-based server and database,
specifically, a
NicheRMS police database, through a secured application, such as the NicheRMS
application, over a secure network connection, such as a Citrix Independent
Computing
Architecture (ICA) connection, wherein the data in the sensitive database is
accessed, and
only present in a secured workspace and never transmitted locally to the
endpoint devices.


Claims

Note: Claims are shown in the official language in which they were submitted.


CLAIMS
We claim:
1. A method for connecting to a secure database through a cloud workspace
comprising,
authenticating a user, the user utilizing a user device,
having affirmatively authenticated the user, establishing a first secure
connection
between the user device and a cloud workspace;
having established the first secure connection, accessing the cloud workspace
having
a secured application client by the user, the secured application client being
a software
that when launched, causes the cloud workspace to establish a second secure
connection to a secure database system requiring two-factor authentication to
access
the secure database and having a secured application server software;
having accessed the cloud workspace, launching the secured application client
by the
user, wherein the secured application client, when in communication with the
secured
application server software, disables the two-factor authentication
requirement of the
secure database system such that the user, having previously been
affirmatively
authenticated, obtains access to the secure database.
2. The
method of claim 1 wherein the secured application client is a NicheRMS
application.
3. The method of claim 1 wherein the secured database is a NicheRMS database.
4. The method of claim 1 wherein the two-factor authentication requirement is
disabled
through an addition of the code TLSSmartcardMonitorEnable=0 in the NicheRMS
application.
5. The method of claim 1, wherein authenticating a user includes utilizing two-
factor
authentication.
6. The method of claim 1, wherein the user device is a user device having
smartcard derived
credentials and authenticating the user further includes a smartcard
authenticator
application affirmatively authenticating the user, provided the smartcard
authenticator
application receives a correct personal identification number input from the
user that
matches the smartcard derived credentials.
7. The method of claim 1, wherein the user device is connected to a smartcard
reader and
authenticating the user further includes a smartcard authenticator
affirmatively
authenticating the user provided the user inserts a smartcard, having an
assigned user, into
the smartcard reader and the smartcard authenticator, reading the smartcard,
establishes
that the user assigned to the smartcard has permissions to access the cloud
workspace .
16

8. The method of claim 1, wherein the user device is a mobile device.
9. The method of claim 1, wherein at least one of the first secure connection
and the second
secure connection is a virtual private network connection established across
the internet.
10. The method of claim 1, wherein at least one of the first secure connection
and the second
secure connection is a dedicated connection.
11. A system for connecting a cloud workspace containing a client's private
data and systems
to a secured cloud database comprising:
a user device, the user device, once authenticated, forming a first secure
connection to
a server infrastructure;
at least one cloud workspace, the cloud workspace being a virtualized
operating
system having a secured application client, connected to a first VLAN wherein
the first VLAN is a client-dedicated segregated VLAN, and stored in at least
one non-volatile memory on server infrastructure, the server infrastructure
having a hypervisor, the hypervisor managing one or more cloud workspace
and one or more VLAN, the server infrastructure further passing the first
secure connection to the cloud workspace;
the first VLAN enabling a connection to a site-to-site secure connection
client,
the site-to-site secure connection client establishing a second secure
connection to a site-to-site secure connection server on a secure
database system;
the secure database system having the site-to-site secure connection server, a
secured application server, and a secure database, the secure database
system having a two-factor authentication requirement to access the
secure database, the secure application server being a software
application that, when accessed by the secure application client,
disables the two-factor authentication requirement.
12. The system of claim 11, wherein the site-to-site secure connection server
can only
establish the second secure connection with the site-to-site secure connection
client.
13. The system of claim 11, wherein the user device is a mobile device.
14. The system of claim 11, wherein at least one of the first secure
connection and the second
secure connection is a virtual private network connection established across
the internet.
15. The system of claim 11, wherein at least one of the first secure
connection and the second
secure connection is a dedicated connection.
17

16. The system of claim 11, wherein the cloud workspace maintains the second
secure
connection if the first secure connection is closed.
17. The system of claim 11, wherein each of the at least one cloud workspace
is deleted daily
and wherein the at least one cloud workspace is formed by the server
infrastructure upon
formation of the first secure connection.
18. The system of claim 11, wherein the server infrastructure comprises one or
more servers,
each of the servers having one or more processor, one or more non-transitory
memory,
and one or more communication components.
19. The system of claim 11, wherein at least one of the first secure
connection and the second
secure connection is an encrypted connection.
20. The system of claim 11, wherein each of the one or more non-volatile
memory is
encrypted.
21. A server infrastructure comprising:
a plurality of servers, each server comprising:
one or more processor;
one or more communication component, the communication component
configured to accept a first secure connection from a user device to a
cloud workspace, the first secure connection established by a cloud
workspace client application on the user device and based at least in
part on a smartcard authenticator, the communication component
further configured to request a second secure connection between a
site-to-site secure connection client accessed by a secured application
client and a site-to-site secure connection server on a secure database
system having a secure database and a secured application server;
one or more non-volatile memory, the non-volatile memory storing at least a
cloud workspace, the cloud workspace being a virtualized operating
system configured to execute the secured application client, the
secured application client being computer code that when executed by
a processor, causes the processor to establish the second secure
connection to the secure database system and remove the two-factor
authentication requirement from the secure database system by causing
the secured application server computer code to be executed;
18

one or more modem, the modem configured to establish the internet connection
with
at least one internet service provider; and,
one or more network switch, each of the one or more network switch configured
to
segregate each user connection within a virtual local area network and
configured to enable data communication between each of the plurality of
servers and the one or more modem.
22. A secure device comprising:
a wireless transceiver;
a microprocessor coupled to the wireless transceiver;
a digital storage element on element coupled to the microprocessor and storing
logic
that when executed by the microprocessor causes the microprocessor to:
receive a request to connect to a secured database from a secured application
on a
cloud server workspace;
route the request to the wireless transceiver;
enable the wireless transceiver to transmit the request to one or more secured
database
servers;
receive a response from the wireless transceiver from the one or more secured
database servers for authentication;
generate a request to the secured application for authentication;
route the request for authentication to the secured application;
receive a response from the secured application that its monitoring function
is
disabled;
route the response to the wireless transceiver;
enable the wireless transceiver to transmit the response to one or more
secured
database servers;
receive a response from the wireless transceiver from the one or more secured
database for two-factor authentication.
19

Description

Note: Descriptions are shown in the official language in which they were submitted.


SYSTEM AND METHOD OF SECURING ACCESS TO A SECURE REMOTE
SERVER AND DATABASE ON A MOBILE DEVICE
FIELD OF THE INVENTION
100011 The present disclosure generally relates to a system and method for
reliably,
securely, and affordably isolating and securing remote access to a secure
cloud-based server
and database, specifically, a Niche Records Management System (RMS) police
database
through a secured application, such as the NicheRMS application, over a secure
networked
connection, such as a Citrix Independent Computing Architecture (ICA)
connection, wherein
the law enforcement data is accessed, from a thin client device or a mobile
device, and is only
present within, the secured application front-end, and is never transmitted to
or stored on the
thin client or mobile device.
BACKGROUND OF THE DISCLOSURE
100021 As background, secure databases, such as sensitive law enforcement
databases,
including any software associated with those databases, have previously only
been accessible
through a Windows client workstation on premise or over a client virtual
private network
("VPN") connection. As such, when a user is away from his client workstation
and needs to
access the sensitive database using a VPN-enabled device, such as a laptop
computer, it is
nearly impossible to reliably due to connectivity issues. As such there is a
need for a system
that enables a user to reliably access the secure database when in the field,
without requiring
the individual to access a VPN-enabled device.
100031 One example of a secure database system is the NicheRMS system, which
stores
law enforcement-related information in one central location. NicheRMS, or
other similar
systems, are commonly used by police departments throughout the world. These
systems,
which include software, provide the ability to record data, retrieve data, and
view data
through a user interface at an on-premise workstation or via a VPN-enabled
device. For
example, a VPN-enabled laptop is required to be stationed in a police
officer's vehicle while
in the field to properly maintain VPN connectivity. The requirement for VPN
connectivity
limits availability to the NicheRMS system due to poor connectivity. As such,
when a user
loses connectivity to the VPN, the user must re-establish a VPN connection to
the NicheRMS
system, however, any unsaved data is lost. This requirement leads to
inefficient data update
processes, and it is cost prohibitive.
1
CA 3074371 2020-03-03

[0004] Using the NicheRMS system as used in Ontario, Canada as an example,
every
public safety agency headquarter has one or more VPN connections to Ontario
Police
Technology Information Co-operative (OPTIC), the site of the shared, single
NicheRMS
system. These connections allow local workstations throughout Ontario to
access resources
from the shared NicheRMS database, such as the Ontario Sex Offender Registry
(OSOR), the
Canadian Police Information Centre (CPIC/CJIM), which is a database of
criminal records
and fingerprints, and the PKIWeb/IGSelfserve OPTIC Certificate Authority
secure portals.
The PKIWeb/IGSelfserve OPTIC Certificate Authority secure portals may be used
to manage
PKI credentials issued to police officers and stored on their smartcards.
Police officers have
had to rely on a client VPN-enabled Mobile Data Terminals (MDT) in their
vehicle to
maintain access to these resources when external to the detachment (i.e., the
client
workstation). The main challenges encountered through using a client VPN are
bandwidth
issues and connectivity instability, because packet loss can result in
termination of the
session. These issues can lead to potential data loss and duplication of
effort when there is a
need to complete previously completed entries. These inefficiencies result in
an increase in
labor costs due to the loss of productivity by safety personnel in the field
who need to return
to the detachment to complete the lost information. Another issue encountered
is that the
secure data contained in the shared NicheRMS database, which cannot be
transmitted without
being encrypted, becomes available in unencrypted form on mobile endpoint
devices, which
can result in complex mitigation actions for data loss prevention.
Specifically, protected data
is information or assets that, if compromised, could cause serious injury to
an individual,
organization, or government.
[0005] To date, the only way to access secure law enforcement databases in the
field is to
use a Windows laptop in a cruiser to create a VPN connection, and then
exchange full data
between the laptop and the database system through the VPN. However, that
solution leads to
all of the potential issues previously described. As such, a solution is
needed to enable a
person in the field to reliably and cost-effectively access the sensitive
database when using
mobile endpoint devices while still maintaining the required level of
security.
[0006] There have been attempts to use session-hosted desktops; however, these
attempts
have failed at the smartcard pass-through authentication mechanism, rendering
all of the
previously mentioned OPTIC-provided resources inaccessible and unusable. The
failure was
caused by competing services in Citrix XenAPP and VMware Horizon View, which
blocked
2
CA 3074371 2020-03-03

access to the smartcard. Until now, this limitation has prevented the adoption
of session-
hosted desktop access to OPTIC resources.
[0007] Specifically, to enable a non-VPN connected system to access the
sensitive law
enforcement database, the system requires support for a common access card
(CAC), which
performs multifactor authentication verification, but not login capability,
and a personal
identity verification (PIV) card, which is a smartcard that contains the card
holder's PKI
credentials that are necessary to login to secure database system and
establish the appropriate
level of security for all applicable applications.). Until now, this has not
been possible.
[0008] The present invention solves the prior shortcomings of the current
systems on the
market and in use, including the inability of persons to reliably and cost-
effectively access
secure databases while in the field. Specifically, the present invention
discloses a new and
novel system and method that implements functioning smartcard pass-through
authentication
to the secure database system, for example, a Citrix session, that supports
both common
access card (CAC) and personal identity verification (Ply).
[0009] This new system has a plethora of advantages not possible in the
current systems.
For example, the new system provides the ability to use thin clients and
mobile devices
lessens the costs to the user by enabling the user to move away from Windows
endpoints
(desktop/laptop), which require costly updating approximately every four
years. Also, the
new system improves overall security by preventing data from ever existing on
the endpoint.
Thus, if a device is lost or stolen there is no threat to loss of information
or security breach is
nonexistent. Additionally, the user has flexibility of work location, and in
turn better
continuity of business, and productivity. As long as there is an internet
connection, the
system can by run. This is very important in emergency type situations where
the user's
main business location may be inaccessible and the user must work from the
field.
SUMMARY OF THE DISCLOSURE
[0010] In one aspect, a method for connecting to a secure database through a
cloud
workspace comprising, authenticating a user, the user utilizing a user device,
having
affirmatively authenticated the user, establishing a first secure connection
between the user
device and a cloud workspace; having established the first secure connection,
accessing the
cloud workspace having a secured application client by the user, the secured
application
client being a software that when launched, causes the cloud workspace to
establish a second
secure connection to a secure database system requiring two-factor
authentication to access
3
CA 3074371 2020-03-03

the secure database and having a secured application server software; having
accessed the
cloud workspace, launching the secured application client by the user, wherein
the secured
application client, when in communication with the secured application server
software,
disables the two-factor authentication requirement of the secure database
system such that the
user, having previously been affirmatively authenticated, obtains access to
the secure
database.
[0011] In one aspect, a system for connecting a cloud workspace containing a
client's
private data and systems to a secured cloud database comprising: a user
device, the user
device, once authenticated, forming a first secure connection to a server
infrastructure; at
least one cloud workspace, the cloud workspace being a virtualized operating
system having
a secured application client, connected to a first VLAN wherein the first VLAN
is a client-
dedicated segregated VLAN, and stored in at least one non-volatile memory on
server
infrastructure, the server infrastructure having a hypervisor, the hypervisor
managing one or
more cloud workspace and one or more VLAN, the server infrastructure further
passing the
first secure connection to the cloud workspace; the first VLAN enabling a
connection to a
site-to-site secure connection client, the site-to-site secure connection
client establishing a
second secure connection to a site-to-site secure connection server on a
secure database
system; the secure database system having the site-to-site secure connection
server, a secured
application server, and a secure database, the secure database system having a
two-factor
authentication requirement to access the secure database, the secure
application server being
a software application that, when accessed by the secure application client,
disables the two-
factor authentication requirement.
[0012] In one aspect, a server infrastructure comprising: a plurality of
servers, each server
comprising: one or more processor; one or more communication component, the
communication component configured to accept a first secure connection from a
user device
to a cloud workspace, the first secure connection established by a cloud
workspace client
application on the user device and based at least in part on a smartcard
authenticator, the
communication component further configured to request a second secure
connection between
a site-to-site secure connection client accessed by a secured application
client and a site-to-
site secure connection server on a secure database system having a secure
database and a
secured application server; one or more non-volatile memory, the non-volatile
memory
storing at least a cloud workspace, the cloud workspace being a virtualized
operating system
configured to execute the secured application client, the secured application
client being
4
CA 3074371 2020-03-03

computer code that when executed by a processor, causes the processor to
establish the
second secure connection to the secure database system and remove the two-
factor
authentication requirement from the secure database system by causing the
secured
application server computer code to be executed; one or more modem, the modem
configured
to establish the internet connection with at least one internet service
provider; and, one or
more network switch, each of the one or more network switch configured to
segregate each
user connection within a virtual local area network and configured to enable
data
communication between each of the plurality of servers and the one or more
modem.
100131 In one aspect, a secure device comprising: a wireless transceiver; a
microprocessor
coupled to the wireless transceiver; a digital storage element on element
coupled to the
microprocessor and storing logic that when executed by the microprocessor
causes the
microprocessor to: receive a request to connect to a secured database from a
secured
application on a cloud server workspace; route the request to the wireless
transceiver; enable
the wireless transceiver to transmit the request to one or more secured
database servers;
receive a response from the wireless transceiver from the one or more secured
database
servers for authentication; generate a request to the secured application for
authentication;
route the request for authentication to the secured application; receive a
response from the
secured application that its monitoring function is disabled; route the
response to the wireless
transceiver; enable the wireless transceiver to transmit the response to one
or more secured
database servers; receive a response from the wireless transceiver from the
one or more
secured database for two-factor authentication.
BRIEF DESCRIPTION OF THE DRAWINGS
100141 The accompanying drawings, which are incorporated in and constitute a
part of this
specification, illustrate one or more implementations described herein and,
together with the
description, explain these implementations. The drawings are not intended to
be drawn to
scale, and certain features and certain views of the figures may be shown
exaggerated, to
scale or in schematic in the interest of clarity and conciseness. Not every
component may be
labeled in every drawing. Like reference numerals in the figures may represent
and refer to
the same or similar element or function. In the drawings:
100151 FIG. 1 is a diagram of an exemplary embodiment of a system of securing
access to
a secure remote server and database.
CA 3074371 2020-03-03

[0016] FIG. 2 is a flow chart of an exemplary embodiment of a user
authentication and
remote access process of the present invention.
DETAILED DESCRIPTION
[0017] All illustrations of the drawings are for the purpose of describing
selected versions
of the present invention and are not intended to limit the scope of the
present invention. The
invention is not limited in its application to the details of the components
and arrangements
as described or illustrated. The invention is capable of other embodiments and
of being
utilized and carried out in various ways.
[0018] As used herein, the terms first, second, third, and the like are used
to distinguish
between similar elements and not necessarily for describing a specific
sequential or
chronological order. The terms are interchangeable under appropriate
circumstances and the
embodiments of the invention can operate in other sequences than described or
illustrated
herein.
[0019] As used in the description herein, the terms "comprises," "comprising,"
"includes,"
"including," "has," "having," or any other variations thereof, are intended to
cover a non-
exclusive inclusion. For example, unless otherwise noted, a process, method,
article, or
apparatus that comprises a list of elements is not necessarily limited to only
those elements,
but may also include other elements not expressly listed or inherent to such
process, method,
article, or apparatus.
[0020] Further, unless expressly stated to the contrary, "or" refers to an
inclusive and not
to an exclusive "or". For example, a condition A or B is satisfied by one of
the following: A
is true (or present) and B is false (or not present), A is false (or not
present) and B is true (or
present), and both A and B are true (or present).
[0021] In addition, use of the "a" or "an" are employed to describe elements
and
components of the embodiments herein. This is done merely for convenience and
to give a
general sense of the inventive concept. This description should be read to
include one or
more, and the singular also includes the plural unless it is obvious that it
is meant otherwise.
Further, use of the term "plurality" is meant to convey "more than one" unless
expressly
stated to the contrary.
[0022] As used herein, qualifiers like "substantially," "about,"
"approximately," and
combinations and variations thereof, are intended to include not only the
exact amount or
value that they qualify, but also some slight deviations therefrom, which may
be due to
6
CA 3074371 2020-03-03

computing tolerances, computing error, manufacturing tolerances, measurement
error, wear
and tear, stresses exerted on various parts, and combinations thereof, for
example.
[0023] The use of the term "at least one" or "one or more" will be understood
to include
one as well as any quantity more than one. In addition, the use of the phrase
"at least one of
X, V, and Z" will be understood to include X alone, V alone, and Z alone, as
well as any
combination of X, V, and Z.
[0024] Circuitry, as used herein, may be analog and/or digital components, or
one or more
suitably programmed processors (e.g., microprocessors) and associated hardware
and
software, or hardwired logic. Also, "components" may perform one or more
functions. The
term "component," may include hardware, such as a processor (e.g.,
microprocessor), an
application specific integrated circuit (ASIC), field programmable gate array
(FPGA), a
combination of hardware and software, and/or the like. The term "processor" as
used herein
means a single processor or multiple processors working independently or
together to
collectively perform a task.
[0025] Software may include one or more computer readable instructions that
when
executed by one or more components cause the component to perform a specified
function. It
should be understood that the algorithms described herein may be stored on one
or more non-
transitory computer readable medium. Exemplary non-transitory computer
readable mediums
may include random access memory, read only memory, flash memory, and/or the
like. Such
non-transitory computer readable mediums may be electrically based,
magnetically based,
optically based, and/or the like.
[0026] As used herein, a network switch is a network device configured to
connect one or
more devices together to form a computer network, thereby enabling the
transfer of data from
a first connected device to a second connected device. A network switch may
provide a
plurality of network interfaces, such as Ethernet, Fibre Channel, RapidIO,
ATM, ITU-T G.hn
and 802.11. A network switch may operate at one or more layer, including layer
1, layer 2,
layer 3, layer 4, or layer 7. Additionally, a network switch may include an
unmanaged switch,
a managed switch, including enterprise managed switch, and/or a smart (or
intelligent)
switch.
[0027] In
addition, the terms top, bottom, front, rear, left, right, upper, lower, and
the like
as used herein are used for descriptive purposes and not necessarily for
describing specific
positions. The terms so used are interchangeable under appropriate
circumstances and the
7
CA 3074371 2020-03-03

embodiments described herein can operate in orientations other than described
or illustrated
herein.
[0028] Furthermore, the phrasing and terminology employed are for the purpose
of
description and should not be regarded as limiting. As such, the present
invention is primarily
used in conjunction with securely accessing police and safety secured
databases; however,
the invention may be used in conjunction to provide secure access to other
types of secured
databases.
[0029] As used herein, the term "client" is used to refer to a company,
business,
organization, sole individual who may utilize the system in its day to day
business-type
activities, while a "user" as used herein is the individual using the system.
[0030] Referring now to FIG. 1, shown therein is the secure access system 100.
The secure
access system 100 generally consists of one or more client device 104, such as
a client
workstation 104a or a mobile device 104b, that forms a first secure connection
108 to a server
infrastructure 112, which, in turn, forms a second secure connection 116 to a
secure database
system 120. In order to form the first secure connection 108, the client
device 104
authenticates user credentials utilizing a smartcard authenticator 124. In one
embodiment,
such as where the client device 104 is the client workstation 104a, the
smartcard authenticator
124 authenticates smartcard credentials from a smartcard reader 128 reading a
smartcard 132.
In another embodiment, such as where the client device 104 is the mobile
device 104b, the
smartcard authenticator 124 authenticates smartcard derived credentials 136.
Once the
smartcard authenticator 124 authenticates the user credentials, the user is
provided access to a
cloud workspace client application 140. The cloud workspace client application
140 then
forms the first secure connection 108 to the server infrastructure 112. The
smartcard derived
credentials 136 are stored on the mobile device 104b. In one embodiment,
Citrix Workspace
(Citi-ix Systems, Inc., Fort Lauderdale, FL) uses the smartcard derived
credentials 136 and a
user personal identification number (PIN) to authenticate the user and unlock
the credentials.
[0031] The client workstation 104a may include, but is not limited to, a
desktop computer,
a desktop terminal, or a laptop computer. The mobile device 104b may include,
but is not
limited to, a cell phone, a personal data assistant (PDA), a tablet, or a
laptop computer. In
other embodiments, the client device 104 is any of a number of endpoints
and/or operating
systems including a desktop, laptop, tablet, mobile device, thin client, iOS
(Apple Inc.,
Cupertino, CA), Android (Google LLC, Mountain View, CA), Windows (Microsoft
Corporation, Redmond, WA), MAC (Apple Inc., Cupertino, CA), Linux, or any
other types
8
CA 3074371 2020-03-03

of endpoints and/or operating systems known in the art, or which may offer the
same
functionality as the endpoints and operating systems identified herein.
[0032] The first secure connection 108 may be a virtual private network
connection
(VPN). The first secure connection 108 may utilize one or more encryption
algorithms to
encrypt the connection between the client device 104 and the server
infrastructure 112. In one
embodiment, the encryption algorithm used is determined by the connection
between the
cloud workspace client application 140 and the cloud workspace 152. In another
embodiment, the first secure connection 108 is a dedicated connection between
the client
device 104 and the server infrastructure 112. The first secure connection 108
may connect to
a first network. In one embodiment, the first network is the Internet and the
client devices
interface with the server infrastructure via a series of web pages or through
custom protocols
utilized by the cloud workspace client application 140. It should be noted,
however, that the
first network may be almost any type of network and may be implemented as the
World Wide
Web (or Internet), a local area network (LAN), a wide area network (WAN), a
metropolitan
network, a wireless network, a cellular network, a Global System for Mobile
Communications (GSM) network, a code division multiple access (CDMA) network,
a 3G
network, a 4G network, an LTE network, a 5G network, a satellite network, a
radio network,
an optical network, a cable network, a public switched telephone network, an
Ethernet
network, combinations thereof, and/or the like. It is conceivable that in the
near future,
embodiments of the present disclosure may use more advanced networking
topologies. In
another embodiment, the first secure connection is established through a
firewall, such as, but
not limited to, a 2xMeraki MX250 provided by Cisco Systems, San Jose,
California.
[0033] The server infrastructure 112 accepts the first secure connection 108
based, at least
in part, on the user credentials authenticated by the smartcard authenticator
124. The server
infrastructure 112 may include at least a gateway, a firewall, a router, and a
user
authenticator. In one embodiment, the server infrastructure 112 compares the
user credentials
against the user authenticator to determine one or more systems to which the
user has
authorization to access. The server infrastructure 112 connects the user to a
cloud service
system 144. The cloud service system 144 connects the user to a segregated
VLAN 148 based
at least in part on the user credentials and/or the user authenticator and
hosts the cloud
workspace 152 that is connected to the segregated VLAN 148.
[0034] In one embodiment, the server infrastructure 112 is a hyper-converged
infrastructure (HCI), which virtualizes all of the elements of conventional
"hardware-
9
CA 3074371 2020-03-03

defined" systems (i.e., a private cloud infrastructure). This is, all
components contained
within the server infrastructure 112, including the cloud service system 144,
the segregated
VLAN 148, the second segregated VLAN 148-2, the cloud workspace 152, the
secured
application client 156, the site-to-site secure connection client 160 and any
other component
operating on the server infrastructure 112 may be virtualized. In one
embodiment, the HCI is
a four node 2U hyper-converged compute and storage cluster, such as a Nutanix
acropolis
hypervisor provided by Nutanix, San Joes, California. Storage within the HCI
may be a
hybrid of flash and mechanical self-encrypting drives that store hot and cold
data
respectively. This ensures that all data at rest and in transit is encrypted,
end-to-end, creating
a private cloud. The HCI may host multiple segregated VLAN 148, 148-2 where
each VLAN
provides the ability to segregate private data of various clients and
services. In one
environment, the server infrastructure 112 includes a backup VLAN, that is, a
segregated
VLAN network that allows a backup software appliance virtual machine access to
the HCI
for block level backups to a hyper-converged storage backup appliance. The
backup software
appliance in the backup VLAN prevents loss of data associated, such as that
associated with
corruption of the data or destruction of the hardware. In one such embodiment,
the backup
software appliance virtual machine is provided by HYCU, Boston, Massachusetts
and the
hyper-converged storage backup appliance is provided by ExaGrid, Westborough,
Massachusetts. By utilizing the hyper-converged infrastructure, as opposed to
other general-
purpose cloud service providers such as Microsoft Azure (Microsoft
Corporation, Redmond,
WA) or Amazon Web Services (AWS, Amazon Web Services, Inc., Seattle, WA), the
server
infrastructure 112 further maintains security by controlling what services and
connections
have access to the server infrastructure 112.
[0035] The segregated VLAN 148 is a virtual local area network formed within a
local
area network (LAN) such that the user accessing the segregated VLAN 148 only
has access
to resources connected to the segregated VLAN 148 but not to other resources
connected to
the LAN or other segregated VLANs. For example only and not by way of
limitation, if a
user is connected to only a first segregated VLAN on a LAN, a server is
connected to only a
second segregated VLAN on the LAN, and a storage device is connected to only
the LAN,
the user would be unable to access the server or the storage device; likewise,
neither the
server nor the storage device would be able to connect to the user.
[0036] In one embodiment, the cloud service system 144 is a virtual cloud
service system
hosted on the server infrastructure 112. The virtual cloud service system may
be one or more
CA 3074371 2020-03-03

application or one or more virtual machine configured to execute one or more
application that
is executed on at least one physical computer having at least one processor.
The virtual
machine includes virtualized computer hardware hosted on one or more non-
virtualized
computer hardware. Computer hardware may include one or more processor, non-
volatile
memory, and/or a communication component. In one embodiment, the segregated
VLAN 148
operates on non-virtualized hardware, such as a hardware component of the
server
infrastructure 112. In another embodiment, the segregated VLAN 148 operates on
virtualized
hardware such as a virtualized communication component and/or a virtualized
switch. In yet
another embodiment, the segregated VLAN 148 operates on both at least one non-
virtualized
hardware and at least one virtualized hardware. The cloud service system 144
may host one
or more segregated VLAN 148, such as segregated VLAN 148-2. In one embodiment,
the
cloud service system 144 includes one or more of a Citrix Hypervisor, formerly
XenServer, a
Citrix Gateway Service, and/or a Netscaler Service (Citrix Systems, Inc, Fort
Lauderdale,
Florida).
[0037] In one embodiment, the cloud workspace 152 is a virtual cloud
workspace, that is,
the cloud workspace 152 is virtualized on the server infrastructure 112. The
cloud workspace
152 hosts a secure application client 156. The secure application client 156
is a computer
application executed by one or more processer of the cloud workspace 152. In
another
embodiment, the secure application client 156 is a computer application
running within a
virtualized container. In another embodiment, the segregated VLAN 148 connects
more than
one cloud workspace 152 and each of the cloud workspaces 152 is a cloned
Microsoft Server
2016 Virtual Machine from a Citrix Master Image, which is configured to the
client's
specifications and requirements and pre-loaded with any applications required
by that
particular client to properly function. All updates (software and OS) are
completed on the
Virtual Machine whereby the Virtual Machine is shut down, a Snapshot is taken
of the
current state of the Virtual Machine and then cloned to the number of cloud
workspaces 152
required for the size of the client including a minimum of two running and
registered cloud
workspaces 152. Once the one or more cloud workspaces 152 are created, the
cloud
workspaces 152 power on and register with the cloud service system 144 such
that they are
ready to accept logins from at least one client. In a preferred embodiment,
all work performed
by the client on secured database 172 is completed through the cloud workspace
152. The
cloud workspaces 152 are disposable, that is, they destroy themselves daily
and are recreated
when the user forms a new first secure connection 108, thereby ensuring the
cloud workspace
11
CA 3074371 2020-03-03

152 maintains integrity by reverting any configurations made by the user to a
default state
defined by the state of the virtual machine when it was most recently formed.
In one
embodiment, the cloud workspace 152 is enabled by XenApp and XenDesktop
services,
provided by Citrix Systems, Inc, Fort Lauderdale, Florida.
[0038] The secured application client 156 forms the second secure connection
116 to the
site-to-site secure connection client 160. In one embodiment, the site-to-site
secure
connection client 160 is the only connection client that can form the second
secure
connection 116 to a site-to-site secure connection server 164 on the secure
database system
120. In another embodiment, the site-to-site secure connection server 164 will
reject any
attempt to form the second secure connection 116 if the second secure
connection 116 does
not originate from a pre-determined device. The pre-determined device may be
limited by the
IP address of the pre-determined device, including either the IPv4 or the IPv6
address, and/or
the MAC address of the pre-determined device, that is the media access control
address. Once
the second secure connection 116 is formed between the site-to-site secure
connection client
160 and the site-to-site secure connection server 164, the user can access a
secured
application server 168 with the secured application client 156. The user can
then utilize the
connection to the secured application server 168 to connect to a secured
database 172.
[0039] The second secure connection 116 may be a virtual private network
connection
(VPN). The second secure connection 116 may utilize one or more encryption
algorithms to
encrypt the connection between the site-to-site secure connection client 160
and the site-to-
site secure connection server 164. The one or more encryption algorithms may
include, for
example only, IPSec (IETF, LLC, Reston, Virginia) and/or OpenTLS (OpenSSL
Software
Foundation, Newark, DE). In another embodiment, the second secure connection
116 is a
dedicated connection between the site-to-site secure connection client 160 and
the site-to-site
secure connection server 164. The second secure connection 116 may connect to
a second
network. In one embodiment, the second network is the Internet and the site-to-
site secure
connection client 160 interfaces with the site-to-site secure connection
server 164 via a series
of web pages or through custom protocols utilized by the site-to-site secure
connection server
164. It should be noted, however, that the second network may be almost any
type of network
and may be implemented as the World Wide Web (or Internet), a local area
network (LAN), a
wide area network (WAN), a metropolitan network, a wireless network, a
cellular network, a
Global System for Mobile Communications (GSM) network, a code division
multiple access
(CDMA) network, a 3G network, a 4G network, an LTE network, a 5G network, a
satellite
12
CA 3074371 2020-03-03

network, a radio network, an optical network, a cable network, a public
switched telephone
network, an Ethernet network, combinations thereof, and/or the like. It is
conceivable that in
the near future, embodiments of the present disclosure may use more advanced
networking
topologies. In another embodiment, the second network is the same as the first
network. In
another embodiment, the second secure connection is established through a
firewall, such as,
but not limited to, a 2xMeraki MX250 provided by Cisco Systems, San Jose,
California.
[0040] As disclosed above and in FIG. 1, any data on the secured database 172
is not
copied or saved locally to the client device 104. The network architecture
disclosed above
and in FIG. 1 prevent access to the secured database 172 by unauthorized users
who may
have access to one or more client device 104 through either innocent or
nefarious means,
even if the unauthorized user has root or administrator access to the client
device 104.
Further, the site-to-site secure connection client 160 connection information
is not known by
or stored on the client device 104 thereby preventing unauthorized users from
determining
connection information for the second secure connection even if the
unauthorized user has
access to the client device 104. Additionally, because the connection to the
secured database
172 is formed with the secured application client 156 on the cloud workspace
152, if the
client device 104, being either the client workstation 104a or the mobile
device 104b, loses
connection to the server infrastructure 112, the connection to the secure
database system 120
would not be reset and all work done on the cloud workspace 152 would not be
lost as it
would still be available when the client connects to the server infrastructure
112 the next
time.
[0041] As shown in Figure 2, the system connects various platforms together in
a way that
maintains a secure and reliable cloud-based connection when utilizing a
NicheRMS
application server 204 (secured application server 168), thus protecting the
integrity of the
data stored on the NicheRMS database 212 and exchanged over the one or more
cloud-based
connections.
[0042] Referring now to FIG. 2, shown therein is a secure application server
connection
diagram 200. As shown in the secure application server connection diagram 200,
to enable a
user to access the NicheRMS application server 204 through the cloud workspace
152
utilizing the client device 104, the user must use the smartcard 132 with the
smartcard reader
128 which is connected directly to the client device 104 (e.g., desktop,
laptop, tablet, mobile
device, thin client, etc.).
13
CA 3074371 2020-03-03

[0043] In a preferred embodiment, the smartcard authenticator 124, the
smartcard reader
128, and the smartcard 132 enable the user to authenticate over a cloud
workspace session
started by the cloud workspace client application 140 to the cloud workspace
152. The
authentication process commences when the user launches the cloud workspace
client
application 140, which launches the smartcard authenticator 124. The smartcard
authenticator
124 instructs the user to insert the smartcard 132 into the smartcard reader
128. The
smartcard authenticator 124 reads, via the smartcard reader 128, the user
credentials stored on
the smartcard 132 and completes the authentication process on behalf of the
cloud workspace
client application 140. If the authentication process is successful, the first
secure connection
108 is established between the cloud workspace client application 140 and the
cloud
workspace 152 thereby providing the user access to the cloud workspace 152 and
thus, a
virtual desktop environment hosting a NicheRMS application client 208. If the
authentication
process is unsuccessful, the first secure connection 108 is not established.
In one
embodiment, the smartcard authenticator 124 is the Entrust Datacard (Entrust
Datacard
Corporation, Minneapolis, MN) smartcard application. In another embodiment,
the smartcard
authenticator 124 is software or firmware integrated into the smartcard reader
128.
[0044] Upon successful user authentication and subsequent access to the cloud
workspace
152 a virtual desktop environment is established thereby enabling the user to
authenticate and
launch the NicheRMS application client 208 which establishes the second secure
connection
116 to the NicheRMS application server 204. The user can then interact with
the NicheRMS
database 212. Specifically, in a preferred embodiment, the NicheRMS
application server 204
contains the line of code: "TLSSmartcardMonitorEnable=0", which disables the
smartcard
monitoring function of the NicheRMS application server 204 and allows the user
to launch
the NicheRMS application client 208 and work with the NicheRMS database212, on
the basis
of smartcard pass-through authentication. Thus, the NicheRMS application
client 208 is
running in the cloud workspace 152. Therefore, if the first secure connection
108 is closed
between the client device 104 and the cloud workspace 152, the NicheRMS
application client
208 continues running unaffected in the cloud workspace 152. In the case that
the first secure
connection 108 is closed, the user simply has to re-establish the first secure
connection 108
between the client device 104 and the cloud workspace 152 and continue working
within the
virtual desktop environment on the cloud workspace 152 where the user left off
when the
connection was closed, thus avoiding data integrity issues and reducing the
chance of
repeating work that may not have been saved within the NicheRMS database 212.
14
CA 3074371 2020-03-03

[0045] In another embodiment, a two-factor authentication process is completed
using
derived credentials, which, through an enrollment process, are derived from
the user
credentials located on the smartcard 132, and permanently stored on a mobile
device for
subsequent authentication when the user launches the cloud workspace client
application 140.
The remainder of the authentication and remote access process is identical to
the process
described above when using the smartcard reader connected to the client device
104.
[0046] Although the invention has been explained through the Figures in
relation to its
preferred embodiment, it is to be understood that many other possible
modifications and
variations can be made without departing from the spirit of the scope of the
invention.
[0047] The foregoing description provides illustration and description, but is
not intended
to be exhaustive or to limit the inventive concepts to the precise form
disclosed.
Modifications and variations are possible in light of the above teachings or
may be acquired
from practice of the methodologies set forth in the present disclosure.
[0048] Even though particular combinations of features are recited in the
claims and/or
disclosed in the specification, these combinations are not intended to limit
the disclosure. In
fact, many of these features may be combined in ways not specifically recited
in the claims
and/or disclosed in the specification. Although each dependent claim listed
below may
directly depend on only one other claim, the disclosure includes each
dependent claim in
combination with every other claim in the claim set.
[0049] No element, act, or instruction used in the present application should
be construed
as critical or essential to the invention unless explicitly described as such
outside of the
preferred embodiment. Further, the phrase "based on" is intended to mean
"based, at least in
part, on" unless explicitly stated otherwise.
=
CA 3074371 2020-03-03

Representative Drawing

Sorry, the representative drawing for patent document number 3074371 was not found.

Administrative Status

2024-08-01:As part of the Next Generation Patents (NGP) transition, the Canadian Patents Database (CPD) now contains a more detailed Event History, which replicates the Event Log of our new back-office solution.

Please note that "Inactive:" events refers to events no longer in use in our new back-office solution.

For a clearer understanding of the status of the application/patent presented on this page, the site Disclaimer , as well as the definitions for Patent , Event History , Maintenance Fee  and Payment History  should be consulted.

Event History

Description Date
Letter Sent 2023-07-28
Inactive: IPC assigned 2023-07-27
Inactive: First IPC assigned 2023-07-27
Inactive: IPC assigned 2023-07-27
Request for Examination Received 2023-06-06
All Requirements for Examination Determined Compliant 2023-06-06
Request for Examination Requirements Determined Compliant 2023-06-06
Application Published (Open to Public Inspection) 2021-04-03
Common Representative Appointed 2020-11-07
Letter sent 2020-03-10
Application Received - PCT 2020-03-09
National Entry Requirements Determined Compliant 2020-03-03
Inactive: QC images - Scanning 2020-03-03

Abandonment History

There is no abandonment history.

Maintenance Fee

The last payment was received on 2023-09-29

Note : If the full payment has not been received on or before the date indicated, a further fee may be required which may be one of the following

  • the reinstatement fee;
  • the late payment fee; or
  • additional fee to reverse deemed expiry.

Patent fees are adjusted on the 1st of January every year. The amounts above are the current amounts if received by December 31 of the current year.
Please refer to the CIPO Patent Fees web page to see all current fee amounts.

Fee History

Fee Type Anniversary Year Due Date Paid Date
Basic national fee - standard 2020-03-03 2020-03-03
MF (application, 2nd anniv.) - standard 02 2021-10-04 2021-09-07
MF (application, 3rd anniv.) - standard 03 2022-10-03 2022-10-19
Late fee (ss. 27.1(2) of the Act) 2022-10-19 2022-10-19
Excess claims (at RE) - standard 2023-10-03 2023-06-06
Request for examination - standard 2024-10-03 2023-06-06
MF (application, 4th anniv.) - standard 04 2023-10-03 2023-09-29
Owners on Record

Note: Records showing the ownership history in alphabetical order.

Current Owners on Record
FSET INC.
Past Owners on Record
AL RIVERS
DAVID BROWN
TRAVIS RIVERS
Past Owners that do not appear in the "Owners on Record" listing will appear in other documentation within the application.
Documents

To view selected files, please enter reCAPTCHA code :



To view images, click a link in the Document Description column. To download the documents, select one or more checkboxes in the first column and then click the "Download Selected in PDF format (Zip Archive)" or the "Download Selected as Single PDF" button.

List of published and non-published patent-specific documents on the CPD .

If you have any difficulty accessing content, you can call the Client Service Centre at 1-866-997-1936 or send them an e-mail at CIPO Client Service Centre.


Document
Description 
Date
(yyyy-mm-dd) 
Number of pages   Size of Image (KB) 
Description 2020-03-02 15 904
Claims 2020-03-02 4 187
Abstract 2020-03-02 1 13
Drawings 2020-03-02 2 38
Courtesy - Letter Acknowledging PCT National Phase Entry 2020-03-09 1 586
Courtesy - Acknowledgement of Request for Examination 2023-07-27 1 422
Request for examination 2023-06-05 4 143
Non published application 2020-03-02 3 97
PCT Correspondence 2020-03-02 4 277
Maintenance fee payment 2022-10-18 1 30