METHODS AND SYSTEMS FOR SECURING A COMPUTER NETWORK
First Claim
1. A method of establishing a secure access to a proprietary network, the method comprising the steps of:
- establishing a communication link between a first device and the proprietary network using a first level of secure access to the network;
requesting an access code by the first device;
generating an access code by the proprietary network in response to the request;
receiving the access code by the first device;
entering the access code into a second device communicatively coupled to the proprietary network, wherein the second device is positioned in a secure location physically accessible only to an authorized user;
comparing the entered access code to the generated access code by the proprietary network; and
enabling a second level of secure access between the first device and the proprietary network.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods and systems for establishing a secure access to a proprietary network is provided. The method includes establishing a communication link between a first device and the proprietary network using a first level of secure access to the network, requesting an access code by the first device. The method further includes generating an access code by the proprietary network in response to the request, receiving the access code by the first device, and entering the access code into a second device communicatively coupled to the proprietary network, wherein the second device is positioned in a secure location physically accessible only to an authorized user. The method also includes comparing the entered access code to the generated access code by the proprietary network, and enabling a second level of secure access between the first device and the proprietary network
-
Citations
20 Claims
-
1. A method of establishing a secure access to a proprietary network, the method comprising the steps of:
-
establishing a communication link between a first device and the proprietary network using a first level of secure access to the network; requesting an access code by the first device; generating an access code by the proprietary network in response to the request; receiving the access code by the first device; entering the access code into a second device communicatively coupled to the proprietary network, wherein the second device is positioned in a secure location physically accessible only to an authorized user; comparing the entered access code to the generated access code by the proprietary network; and enabling a second level of secure access between the first device and the proprietary network. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A secure proprietary network access system that provides location verification comprising:
-
a proprietary network under the physical control of an enterprise; a first device adapted to communicate with the proprietary network using a first level of secure access to the proprietary network, the first device further adapted to receive an access code generated by the proprietary network for a second level of secure access to the proprietary network after receiving a request for the access code made by the first device; a second device communicatively coupled to the proprietary network, wherein the second device is positioned in a secure location physically accessible only to an authorized user, said second device is configured to receive the access code from a user in physical control of the first device and to transmit the access code to the proprietary network; wherein the proprietary network compares the access code transmitted by the second device to the access code generated by the proprietary network and if the access codes are identical, the proprietary network enables a second level of secure access between the first device and the proprietary network. - View Dependent Claims (9, 10, 11)
-
-
12. A method of establishing a secure access to a proprietary network, the method comprising the steps of:
-
communicating with the proprietary network from a wireless device through a first communication link having a first level of secure of access; transmitting an access code for establishing a communication link having a second level of secure access to the wireless device; entering the access code into a second device communicatively coupled to the proprietary network through a second communication link; and enabling the second level of secure access for the first communication link for the wireless device. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20)
-
Specification