Remote assistance
First Claim
1. In a system that includes a user computer and an expert computer connected with a network, wherein a user requires support services for the user computer and the expert is able to provide support services to the user, a method for requesting support services from the expert that permits the expert to control the user computer such that the user receives support services from the expert, the method comprising:
- a step for generating a ticket on the user computer, the ticket including credentials that permit the expert computer to login to the user computer;
a step for escalating the ticket to the expert computer;
a step for receiving a connection request from the expert computer indicating that the expert computer desires to connect with the user computer;
a step for accepting the connection request such that the expert computer is able to view a desktop of the user computer but cannot control the user computer;
a step for receiving a control request from the expert computer to remotely control the user computer over the network; and
a step for providing control of the user computer to the expert computer such that the expert is able to control the user computer.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for remote assistance. A user computer is able to generate a ticket that includes temporary credentials for a remote assistance account of the user computer. The ticket is escalated to an expert, who activates the ticket and requests a connection with the user using the encrypted credentials. The user can accept this request if the credentials are validated and provide the expert with a view of the user'"'"'s desktop. The expert, if necessary, can request control of the user computer and the user can either grant or deny this request. If granted, the user computer can unilaterally terminate the control that was provided to the expert. Because the credentials in the ticket are encrypted, the expert does not know the actual password to the remote assistance account and can only access the user computer interactively.
-
Citations
50 Claims
-
1. In a system that includes a user computer and an expert computer connected with a network, wherein a user requires support services for the user computer and the expert is able to provide support services to the user, a method for requesting support services from the expert that permits the expert to control the user computer such that the user receives support services from the expert, the method comprising:
-
a step for generating a ticket on the user computer, the ticket including credentials that permit the expert computer to login to the user computer;
a step for escalating the ticket to the expert computer;
a step for receiving a connection request from the expert computer indicating that the expert computer desires to connect with the user computer;
a step for accepting the connection request such that the expert computer is able to view a desktop of the user computer but cannot control the user computer;
a step for receiving a control request from the expert computer to remotely control the user computer over the network; and
a step for providing control of the user computer to the expert computer such that the expert is able to control the user computer. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. In a system that includes a user computer and an expert computer connected with a network, wherein a user requires support services for the user computer and the expert is able to provide support services to the user, a computer program product for implementing a method for requesting support services from the expert that permits the expert to control the user computer such that the user receives support services from the expert, the computer program product comprising:
a computer readable medium having computer executable instructions for performing the method, the method comprising;
a step for generating a ticket on the user computer, the ticket including credentials that permit the expert computer to login to the user computer;
a step for escalating the ticket to the expert computer;
a step for receiving a connection request from the expert computer indicating that the expert computer desires to connect with the user computer;
a step for accepting the connection request such that the expert computer is able to view a desktop of the user computer but cannot control the user computer;
a step for receiving a control request from the expert computer to remotely control the user computer over the network; and
a step for providing control of the user computer to the expert computer such that the expert is able to control the user computer. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
19. In a system that includes a user computer and an expert computer connected with a network, wherein a user requires support services for the user computer and the expert is able to provide support services to the user, a method for remotely controlling the user computer from the expert computer such that the expert is able to provide support services to the user, the method comprising:
-
a step for receiving a ticket from the user computer, wherein the ticket includes encrypted credentials;
a step for activating the ticket;
in response to activating the ticket, a step for requesting a connection with the user computer over the network using the credentials in the ticket, wherein an expert is able to view a desktop of the user computer if the connection request is granted by the user computer;
requesting control of the user computer; and
controlling the user computer from the expert computer over the connection such that the expert is able to provide support services to the user, wherein the expert is still able to view the desktop of the user computer even if the request to control the user computer is denied. - View Dependent Claims (20, 21, 22, 23, 24)
-
-
25. In a system that includes a user computer and an expert computer connected with a network, wherein a user requires support services for the user computer and the expert is able to provide support services to the user, a computer program product for implementing a method for remotely controlling the user computer from the expert computer such that the expert is able to provide support services to the user, the computer program product comprising:
a computer readable medium having computer readable instructions for performing the method, the method comprising;
a step for receiving a ticket from the user computer, wherein the ticket includes encrypted credentials;
a step for activating the ticket;
in response to activating the ticket, a step for requesting a connection with the user computer over the network using the credentials in the ticket, wherein an expert is able to view a desktop of the user computer if the connection request is granted by the user computer;
requesting control of the user computer; and
controlling the user computer from the expert computer over the connection such that the expert is able to provide support services to the user, wherein the expert is still able to view the desktop of the user computer even if the request to control the user computer is denied. - View Dependent Claims (26, 27, 28, 29, 30)
-
31. In a system that includes a user computer connection with at least one expert computer over a network, wherein a user requires support services for the user computer and an expert is able to provide support services to the user computer, a method for requesting support services from an expert that enables the expert to view or control the user computer, the method comprising:
-
a step for creating a table to store outstanding remote assistance requests, wherein each row of the table corresponds to a particular ticket that was sent to an expert and wherein the table has an associated key;
an act of creating a new entry in the table when a new ticket is created, wherein each row of the table comprises a security identifier of the user, a session identifier and a timeout value;
a step for escalating a ticket to an expert; and
when a connection request is received from an expert that received a ticket, a step for verifying the credentials by decrypting the key and a password, wherein the connection request is granted if the key in the connection request is same as the key associated with the table and if the password in the connection request is the same as a remote assistance account password of the user computer. - View Dependent Claims (32, 33, 34, 35, 36, 37)
-
-
38. In a system that includes a user computer connection with at least one expert computer over a network, wherein a user requires support services for the user computer and an expert is able to provide support services to the user computer that, a computer program product for implementing a method for requesting support services from an expert that enables the expert to view or control the user computer, the computer program product comprising:
a computer readable medium having computer executable instructions for performing the method, the method comprising;
a step for creating a table to store outstanding remote assistance requests, wherein each row of the table corresponds to a particular ticket that was sent to an expert and wherein the table has an associated key;
an act of creating a new entry in the table when a new ticket is created, wherein each row of the table comprises a security identifier of the user, a session identifier and a timeout value;
a step for escalating a ticket to an expert; and
when a connection request is received from an expert that received a ticket, a step for verifying the credentials by decrypting the key and a password, wherein the connection request is granted if the key in the connection request is same as the key associated with the table and if the password in the connection request is the same as a remote assistance account password of the user computer. - View Dependent Claims (39, 40, 41, 42, 43, 44)
-
45. In a system including one or more user computers that are able to receive support from a support service, a method for providing support services to the one or more user computers by having the support service remotely view or control the one or more user computers, the method comprising:
-
a step for receiving a ticket from a user at a terminal server, wherein the terminal server is behind a firewall of the support service;
a step for logging in to the terminal server by the support service;
a step for activating the ticket at the terminal server such that a network of the support service is not included in a domain of the user computer;
a step for requesting a connection with the user computer, wherein a view of a desktop of the user computer is received if the connection request is granted by the user; and
a step for requesting control of the user computer, wherein the support service has control of the user computer if the control request is granted. - View Dependent Claims (46)
-
-
47. In a system that includes a user computer and an expert computer connected by a network, a method for accessing the user computer by the expert computer in a manner that permits the user computer to control the access that is granted to the expert computer, the method comprising:
-
generating a ticket that includes credentials that comprise an encrypted remote assistance account password and an encrypted key;
escalating the ticket to the expert computer, wherein the expert has possession of the ticket, wherein possession of the ticket is required to access the user computer and wherein the remote assistance account password and the key are unknown to the expert computer;
generating a connection request that includes the credentials, wherein the credentials are decrypted by the user computer; and
granting access to the expert computer if the decrypted remote assistance account password is validated and if the key is still valid and has not been changed. - View Dependent Claims (48, 49, 50)
-
Specification