Method and apparatus for providing temporary access to a network device
First Claim
1. A machine-implemented method for providing access to resources of a network device, the method comprising:
- receiving input from a first user;
generating a first password for said resources of said network device based on, at least in part, (a) said input, and (b) an algorithm, wherein said algorithm is concealed from said first user, and wherein said first password is concealed from said first user;
receiving a second password from a second user, wherein said second password is generated based on, at least in part, (a) said input, and (b) said algorithm, wherein said algorithm is known to said second user, and wherein said second password is concealed from said first user;
determining whether said first password matches said second password; and
in response to determining that said first password matches said second password, providing said second user with access to said resources of said network device.
2 Assignments
0 Petitions
Accused Products
Abstract
A method and apparatus for providing access to resources of a network device is provided. A user instructs a network device to generate a user password that is concealed from the user of the network device. The network device generates the user password based on, at least in part, public input provided by the user, and an algorithm which is concealed from the user, but known to a support service provider. The user communicates the public input to the support service provider. The support service provider uses the public input to generate a provider password based on, at least in part, the algorithm. The support service provider may access the network device via a network by providing the provider password to the network device. If the provider password matches the user password generated, then the support service provider is granted access to resources of the network device.
-
Citations
27 Claims
-
1. A machine-implemented method for providing access to resources of a network device, the method comprising:
-
receiving input from a first user;
generating a first password for said resources of said network device based on, at least in part, (a) said input, and (b) an algorithm, wherein said algorithm is concealed from said first user, and wherein said first password is concealed from said first user;
receiving a second password from a second user, wherein said second password is generated based on, at least in part, (a) said input, and (b) said algorithm, wherein said algorithm is known to said second user, and wherein said second password is concealed from said first user;
determining whether said first password matches said second password; and
in response to determining that said first password matches said second password, providing said second user with access to said resources of said network device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A machine-readable medium carrying one or more sequences of instructions for providing access to resources of a network device, wherein execution of the one or more sequences of instructions by one or more processors causes the one or more processors to perform the steps of:
-
receiving input from a first user;
generating a first password for said resources of said network device based on, at least in part, (a) said input, and (b) an algorithm, wherein said algorithm is concealed from said first user, and wherein said first password is concealed from said first user;
receiving a second password from a second user, wherein said second password is generated based on, at least in part, (a) said input, and (b) said algorithm, wherein said algorithm is known to said second user, and wherein said second password is concealed from said first user;
determining whether said first password matches said second password; and
in response to determining that said first password matches said second password, providing said second user with access to said resources of said network device. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. An apparatus comprising:
-
a processor; and
a memory coupled to the processor, the memory containing one or more sequences of instructions for monitoring email messages received at a server, wherein execution of the one or more sequences of instructions by the processor causes the processor to perform the steps of;
receiving input from a first user;
generating a first password for said resources of said network device based on, at least in part, (a) said input, and (b) an algorithm, wherein said algorithm is concealed from said first user, and wherein said first password is concealed from said first user;
receiving a second password from a second user, wherein said second password is generated based on, at least in part, (a) said input, and (b) said algorithm, wherein said algorithm is known to said second user, and wherein said second password is concealed from said first user;
determining whether said first password matches said second password; and
in response to determining that said first password matches said second password, providing said second user with access to said resources of said network device. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26, 27)
-
Specification