Remote Access Method
First Claim
1. A remote access method in which an operational computer on an intranet accesses a target computer on the same or on the other intranet via a relay management server on the Internet, comprising:
- a step in which each user carries an external storage medium having unique identification information different from each other;
a step in which the target computer transmits authentication information on each user to the relay management server to establish a connection;
a step in which at least a portion of a program for connecting the operational computer and the relay management server is stored in advance in the external storage medium;
a step in which the external storage medium having the unique identification information is connected to the operational computer;
a step in which the operational computer processes the unique identification information to generate special authentication information for the relay management server to perform authentication;
a step in which the user inputs authentication information for authentication of the user from the operational computer;
a step in which the operational computer transmits authentication information and the special authentication information for authentication of the user to the relay management server; and
a step in which the relay management server permits connection to the operational computer when the both of the authentication information and the special authentication information for authentication of the user are transmitted from the operational computer.
1 Assignment
0 Petitions
Accused Products
Abstract
All operations available on an intranet are securely performed from an outside of the intranet without taking out a file on the intranet from the intranet. A file on the intranet is not taken out, but, instead of this, image information on a target computer 1 is transmitted to an operational computer 4 with the http protocol, the https protocol, or the SSL protocol, and keyboard information, pointing information, or the like are transmitted from an operational computer 4 to the target computer 1. Consequently, the target computer 1 is operated.
-
Citations
10 Claims
-
1. A remote access method in which an operational computer on an intranet accesses a target computer on the same or on the other intranet via a relay management server on the Internet, comprising:
-
a step in which each user carries an external storage medium having unique identification information different from each other; a step in which the target computer transmits authentication information on each user to the relay management server to establish a connection; a step in which at least a portion of a program for connecting the operational computer and the relay management server is stored in advance in the external storage medium; a step in which the external storage medium having the unique identification information is connected to the operational computer; a step in which the operational computer processes the unique identification information to generate special authentication information for the relay management server to perform authentication; a step in which the user inputs authentication information for authentication of the user from the operational computer; a step in which the operational computer transmits authentication information and the special authentication information for authentication of the user to the relay management server; and a step in which the relay management server permits connection to the operational computer when the both of the authentication information and the special authentication information for authentication of the user are transmitted from the operational computer. - View Dependent Claims (2, 3)
-
-
4. A remote access method for accessing a target computer from an operational computer over a network, comprising:
-
a user authentication information transmission step in which the operational computer transmits user authentication information to the target computer; a user authentication information determination step in which the target computer determines whether or not the user authentication information transmitted from the operational computer is based on original user information of a valid user; and a temporary login permission step in which the user is temporarily enabled to log in to a specific application if it is determined that the user authentication information is based on the original user information of the valid user in the user authentication information determination step. - View Dependent Claims (5, 6, 7)
-
-
8. A program in a remote access method for accessing a target computer from an operational computer over a network which enables the operational computer to perform a user authentication information transmission step in which user authentication information is transmitted to the target computer.
-
9. A program in a remote access method for accessing a target computer from an operational computer over a network which enables the target computer to perform:
-
a user authentication information determination step in which it is determined whether or not user authentication information transmitted from the operational computer is based on original user information of a valid user and a temporary login permission step in which the user is temporarily enabled to log in to a specific application if it is determined that the user authentication information is based on the original user information of the valid user in the user authentication information determination step.
-
-
10. An external storage medium used for accessing a target computer by connecting the external storage medium to an operational computer in a remote access method for accessing the target computer from the operational computer over a network,
wherein unique identification information for identifying the external storage medium and original user information as user authentication information are stored.
Specification