摘要 |
Controlling access to secure data and services by versatile computers outside a secure environment, which communicates with limited dedicated devices such as game consoles, over a secure network such as a virtual private network. The versatile computing devices obtain access over an insecure network, such as the Internet, through a trusted partner Web site that authenticates users of the site and relays requests to the secure environment. The Web site uses a certificate for a predefined level of secure access to the secure environment. A link is established between a user's Web ID authenticated by the Web site and a gamer tag used within the secure environment. Access is limited as a function of the Web ID, gamer tag, and a Web site partner ID. A Web cache stores and provides some secure data, minimizing disruption to the secure environment's primary function to service the dedicated devices. <IMAGE> |