Dynamically accessing and configuring secured systems
First Claim
1. A computer-implemented method, comprising:
- obtaining, by one or more processors in a first computing environment, from a computer system in the first environment, a system message indicating an issue in the computer system, wherein the first computing environment is a secured computing environment comprising computing resources in communication with each other via an intranet connection;
evaluating, by the one or more processors, the contents of the system message, wherein the system message comprises data from the computer system to determine details of the issue;
based on determining the details of the system issue, determining, by the one or more processors, one or more recommended actions to remedy the issue;
generating, by the one or more processors, a notification comprising the one or more recommended actions, wherein the one or more recommended actions comprise calls to portions of the computer system, wherein the generating comprises retaining the data in the first environment, wherein the notification comprises respective selection options to trigger the one or more processors to execute each of the one or more recommended actions in the first environment;
transmitting, by the one or more processors, the notification to a computing node in a second computing environment, wherein based on receiving the notification, the computing node communicates the notification to a computing device utilized by an authorized user in the second computing environment, via an application provided by the computing node to the computing device over an Internet connection, wherein computing resources comprising the second computing environment are not authorized to access the intranet connection and are located outside of the secured computing environment comprising the first computing environment;
receiving, by the one or more processors, via a secure protocol, from the computing device, via the computing node, a response indicating selection of a respective selection option of the respective selection options, wherein the receiving comprises authenticating, by the computing node, the authorized user of the computing device in the second environment;
translating, by the one or more processors, the respective selection option into a recommended action of the one or more recommended actions; and
issuing, by the one or more processors, based on the recommended action, calls comprising the recommended action to the computer system to remedy the issue, wherein executing the recommended action responsive to the calls comprises accessing the data in the first environment.
1 Assignment
0 Petitions
Accused Products
Abstract
A method, computer program product, and system includes a processor(s) in a first computing environment obtaining, from a computer system in the first environment, a system message indicating an issue in the computer system. The processor(s) evaluate the message to determine details of the issue and determine recommended action(s) to remedy the issue. The processor(s) generate a notification comprising the action(s), which include calls to portions of the computer system and the notification comprises respective selection options to trigger the processor(s) to execute each of the one or more recommended actions in the first environment. The processor(s) transmit the notification to a computing node in a second computing environment to communicate to a computing device in that environment. The processor(s) receive a response indicating selection of a respective selection option. The processor(s) translate the option into a recommended action and issue calls in the recommended action to the computer system.
22 Citations
15 Claims
-
1. A computer-implemented method, comprising:
-
obtaining, by one or more processors in a first computing environment, from a computer system in the first environment, a system message indicating an issue in the computer system, wherein the first computing environment is a secured computing environment comprising computing resources in communication with each other via an intranet connection; evaluating, by the one or more processors, the contents of the system message, wherein the system message comprises data from the computer system to determine details of the issue; based on determining the details of the system issue, determining, by the one or more processors, one or more recommended actions to remedy the issue; generating, by the one or more processors, a notification comprising the one or more recommended actions, wherein the one or more recommended actions comprise calls to portions of the computer system, wherein the generating comprises retaining the data in the first environment, wherein the notification comprises respective selection options to trigger the one or more processors to execute each of the one or more recommended actions in the first environment; transmitting, by the one or more processors, the notification to a computing node in a second computing environment, wherein based on receiving the notification, the computing node communicates the notification to a computing device utilized by an authorized user in the second computing environment, via an application provided by the computing node to the computing device over an Internet connection, wherein computing resources comprising the second computing environment are not authorized to access the intranet connection and are located outside of the secured computing environment comprising the first computing environment; receiving, by the one or more processors, via a secure protocol, from the computing device, via the computing node, a response indicating selection of a respective selection option of the respective selection options, wherein the receiving comprises authenticating, by the computing node, the authorized user of the computing device in the second environment; translating, by the one or more processors, the respective selection option into a recommended action of the one or more recommended actions; and issuing, by the one or more processors, based on the recommended action, calls comprising the recommended action to the computer system to remedy the issue, wherein executing the recommended action responsive to the calls comprises accessing the data in the first environment. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A computer program product comprising:
a computer readable storage medium readable by one or more processors and storing instructions for execution by the one or more processors for performing a method comprising; obtaining, by the one or more processors in a first computing environment, from a computer system in the first environment, a system message indicating an issue in the computer system, wherein the first computing environment is a secured computing environment comprising computing resources in communication with each other via an intranet connection; evaluating, by the one or more processors, the contents of the system message, wherein the system message comprises data from the computer system to determine details of the issue; based on determining the details of the system issue, determining, by the one or more processors, one or more recommended actions to remedy the issue; generating, by the one or more processors, a notification comprising the one or more recommended actions, wherein the one or more recommended actions comprise calls to portions of the computer system, wherein the generating comprises retaining the data in the first environment, wherein the notification comprises respective selection options to trigger the one or more processors to execute each of the one or more recommended actions in the first environment; transmitting, by the one or more processors, the notification to a computing node in a second computing environment, wherein based on receiving the notification, the computing node communicates the notification to a computing device utilized by an authorized user in the second computing environment, via an application provided by the computing node to the computing device over an Internet connection, wherein computing resources comprising the second computing environment are not authorized to access the intranet connection and are located outside of the secured computing environment comprising the first computing environment; receiving, by the one or more processors, via a secure protocol, from the computing device, via the computing node, a response indicating selection of a respective selection option of the respective selection options, wherein the receiving comprises authenticating, by the computing node, the authorized user of the computing device in the second environment; translating, by the one or more processors, the respective selection option into a recommended action of the one or more recommended actions; and issuing, by the one or more processors, based on the recommended action, calls comprising the recommended action to the computer system to remedy the issue, wherein executing the recommended action responsive to the calls comprises accessing the data in the first environment. - View Dependent Claims (13, 14)
-
15. A system comprising:
-
a memory; one or more processors in communication with the memory; and program instructions executable by the one or more processors via the memory to perform a method, the method comprising; obtaining, by the one or more processors in a first computing environment, from a computer system in the first environment, a system message indicating an issue in the computer system, wherein the first computing environment is a secured computing environment comprising computing resources in communication with each other via an intranet connection; evaluating, by the one or more processors, the contents of the system message, wherein the system message comprises data from the computer system to determine details of the issue; based on determining the details of the system issue, determining, by the one or more processors, one or more recommended actions to remedy the issue; generating, by the one or more processors, a notification comprising the one or more recommended actions, wherein the one or more recommended actions comprise calls to portions of the computer system, wherein the generating comprises retaining the data in the first environment, wherein the notification comprises respective selection options to trigger the one or more processors to execute each of the one or more recommended actions in the first environment; transmitting, by the one or more processors, the notification to a computing node in a second computing environment, wherein based on receiving the notification, the computing node communicates the notification to a computing device utilized by an authorized user in the second computing environment, via an application provided by the computing node to the computing device over an Internet connection, wherein computing resources comprising the second computing environment are not authorized to access the intranet connection and are located outside of the secured computing environment comprising the first computing environment; receiving, by the one or more processors, via a secure protocol, from the computing device, via the computing node, a response indicating selection of a respective selection option of the respective selection options, wherein the receiving comprises authenticating, by the computing node, the authorized user of the computing device in the second environment; translating, by the one or more processors, the respective selection option into a recommended action of the one or more recommended actions; and issuing, by the one or more processors, based on the recommended action, calls comprising the recommended action to the computer system to remedy the issue, wherein executing the recommended action responsive to the calls comprises accessing the data in the first environment.
-
Specification