Method and apparatus for authenticated dial-up access to command controllable equipment
0 Assignments
0 Petitions
Accused Products
Abstract
A method and apparatus for secure and authenticated access to command controllable computerized equipment is described. The method involves using an access apparatus that prevents access to the command controllable computerized equipment until a user is authenticated as a trusted user authorized to access the command controllable computer equipment. The apparatus may be a secure access controller or a secure access transceiver. Each has a normally disabled data port that prevents the pass-through of data until a user is authenticated as a trusted user. The apparatus may operate under autonomous control or under the control of a network centric control facility. The advantage is secure control of access to command controllable computerized equipment that enables remote access to the equipment by authorized users with substantially no risk of compromise.
15 Citations
106 Claims
-
1-60. -60. (canceled)
-
61. A system for controlling access to computerized equipment by a remote entity, said system comprising:
-
an authentication server and an access controller interconnectable with each other and with said remote entity for communications therebetween, said access controller connected to said computerized equipment;
said authentication server operable to provide said remote entity with a first access key and said access controller with a second access key corresponding to said first access key;
said access controller operable to attempt to authenticate said remote entity at least in part on a basis of said access keys, wherein said access controller enables data to pass from said remote entity to said computerized equipment only upon successful authentication of said remote entity. - View Dependent Claims (62, 63, 64, 65, 66, 67, 68, 69, 70, 71, 72, 73, 74, 75)
-
-
76. A method for controlling access to computerized equipment by a remote entity, the computerized equipment connected to an access controller operative to enable data to be passed from the remote entity to the computerized equipment if the remote entity is successfully authenticated, said method comprising:
-
receiving a request for access to the computerized equipment from the remote entity;
determining a first access key and a second access key corresponding to said first access key;
providing said first access key to the remote entity;
providing said second access key to the access controller for use in the authentication of the remote entity. - View Dependent Claims (77, 78, 79, 80, 81, 82, 83)
-
-
84. An authentication server for controlling access to computerized equipment by a remote entity, said computerized equipment connected to an access controller, said authentication server responsive to a request from said remote entity for access to said computerized equipment to provide said remote entity with a first access key and said access controller with a second access key corresponding to said first access key, wherein said first access key is usable by said remote entity for communication with said access controller and said second access key is usable by said access controller for attempting to authenticate said remote entity, said access controller enabling data to be passed from said remote entity to said computerized equipment only upon successful authentication of said remote entity.
-
85. In an authentication server, a method of controlling access to computerized equipment by a remote entity, said computerized equipment connected to an access controller operative to enable data to be passed from said remote entity to said computerized equipment if said remote entity is successfully authenticated, said method comprising:
-
receiving a request from said remote entity for access to said computerized equipment;
delivering a first access key to said remote entity, said first access key usable by said remote entity for communication with said access controller;
delivering a second access key to said access controller for use in the authentication of said remote entity. - View Dependent Claims (86, 87, 88, 89, 90, 91, 92)
-
- 93. An access controller for intermediating communications between a remote entity and computerized equipment, said remote entity using a first access key for communicating with said access controller, said access controller operative to use a second access key complementary to said first access key for attempting to authenticate said remote entity, said access controller enabling data to be passed from said remote entity to said computerized equipment only upon successful authentication of said remote entity.
-
96. In an access controller, a method for selectively passing data from a remote entity to computerized equipment in order to ensure secure access to the computerized equipment, said remote entity using a first access key for communicating with said access controller, said method comprising:
-
using a second access key complementary to said first access key for attempting to authenticate said remote entity;
if authentication of said remote entity is successful, enabling data to be passed from said remote entity to said computerized equipment;
if authentication of said remote entity fails, preventing data from being passed from said remote entity to said computerized equipment. - View Dependent Claims (97, 98, 99, 100, 101, 102, 103, 104, 105, 106)
-
Specification