×

Dynamically accessing and configuring secured systems

  • US 10,419,564 B2
  • Filed: 04/18/2017
  • Issued: 09/17/2019
  • Est. Priority Date: 04/18/2017
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method, comprising:

  • obtaining, by one or more processors in a first computing environment, from a computer system in the first environment, a system message indicating an issue in the computer system, wherein the first computing environment is a secured computing environment comprising computing resources in communication with each other via an intranet connection;

    evaluating, by the one or more processors, the contents of the system message, wherein the system message comprises data from the computer system to determine details of the issue;

    based on determining the details of the system issue, determining, by the one or more processors, one or more recommended actions to remedy the issue;

    generating, by the one or more processors, a notification comprising the one or more recommended actions, wherein the one or more recommended actions comprise calls to portions of the computer system, wherein the generating comprises retaining the data in the first environment, wherein the notification comprises respective selection options to trigger the one or more processors to execute each of the one or more recommended actions in the first environment;

    transmitting, by the one or more processors, the notification to a computing node in a second computing environment, wherein based on receiving the notification, the computing node communicates the notification to a computing device utilized by an authorized user in the second computing environment, via an application provided by the computing node to the computing device over an Internet connection, wherein computing resources comprising the second computing environment are not authorized to access the intranet connection and are located outside of the secured computing environment comprising the first computing environment;

    receiving, by the one or more processors, via a secure protocol, from the computing device, via the computing node, a response indicating selection of a respective selection option of the respective selection options, wherein the receiving comprises authenticating, by the computing node, the authorized user of the computing device in the second environment;

    translating, by the one or more processors, the respective selection option into a recommended action of the one or more recommended actions; and

    issuing, by the one or more processors, based on the recommended action, calls comprising the recommended action to the computer system to remedy the issue, wherein executing the recommended action responsive to the calls comprises accessing the data in the first environment.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×