System and method for secure remote computer task automation
First Claim
1. A method, comprising:
- receiving at a third party authority a request from a client computer, the request including authentication information and an access request;
authenticating the client computer based on the authentication information;
processing the access request to grant the client computer access to a target computer to perform a task on the target computer, the access request including the task;
sending an access token to the client computer to access the target computer to perform the task;
receiving the access token from the target computer for validation; and
validating the received access token based on the request for the target computer to process the task.
3 Assignments
0 Petitions
Accused Products
Abstract
A system includes a third party authority in communication with a client computer and a target computer. The third party authority is configured to receive a request including authentication information and an access request from the client computer. The third party authority is configured to authenticate the client computer based on the authentication information and to process the access request to grant the client computer access to the target computer to perform a task on the target computer, the access request including the task. The third party authority is further configured to send an access token to the client computer to access the target computer to perform the task, to receive the access token from the target computer for validation, to validate the received access token based on the request for the target computer to process the task, and to grant the target computer permission to process the task upon validation.
-
Citations
51 Claims
-
1. A method, comprising:
-
receiving at a third party authority a request from a client computer, the request including authentication information and an access request; authenticating the client computer based on the authentication information; processing the access request to grant the client computer access to a target computer to perform a task on the target computer, the access request including the task; sending an access token to the client computer to access the target computer to perform the task; receiving the access token from the target computer for validation; and validating the received access token based on the request for the target computer to process the task. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method, comprising:
-
sending a request including authentication information and an access request, from a client computer to a third party authority; receiving an access token from the third party authority at the client computer; sending the access token from the client computer to a target computer; and accessing the target computer to perform a task on the target computer. - View Dependent Claims (7, 8, 9, 10, 11, 12, 13)
-
-
14. A method, comprising:
-
receiving an access token at a target computer; sending the access token to a third party authority for validation; receiving validation from the third party authority to process a task; processing the task; granting a client computer access to the target computer to perform the task; spawning a thread to process the task on the target computer; and sending to the client computer an acknowledgement indicating a status of the task. - View Dependent Claims (15, 16, 17, 18)
-
-
19. A computer program product including a computer readable medium having stored thereon computer executable instructions that, when executed by a computer, direct the computer to perform a method comprising the steps of:
-
receiving a request from a client computer, the request including authentication information and an access request; authenticating the client computer based on the authentication information; processing the access request to grant the client computer access to a target computer to perform a task on the target computer, the access request including the task; sending an access token to the client computer to access the target computer to perform the task; receiving the access token from the target computer for validation; and validating the received access token based on the request for the target computer to process the task. - View Dependent Claims (20, 21, 22, 23)
-
-
24. A computer program product including a computer readable medium having stored thereon computer executable instructions that, when executed by a computer, direct the computer to perform a method comprising the steps of:
-
sending a request including authentication information and an access request to a third party authority; receiving an access token from the third party authority; sending the access token to a target computer; and accessing the target computer to perform a task on the target computer. - View Dependent Claims (25, 26, 27, 28, 29, 30, 31)
-
-
32. A computer program product including a computer readable medium having stored thereon computer executable instructions that, when executed by a computer, direct the computer to perform a method comprising the steps of:
-
receiving an access token sending the access token to a third party authority for validation; receiving validation from the third party authority to process a task; processing the task; granting a client computer access to the computer to perform the task; spawning a thread to process the task on the computer; and sending to the client computer an acknowledgement indicating a status of the task. - View Dependent Claims (33, 34, 35, 36)
-
-
37. A system, comprising:
-
a third party authority in communication with a client computer and a target computer; the third party authority configured to; receive a request from the client computer, the request including authentication information and an access request, authenticate the client computer based on the authentication information, process the access request to grant the client computer access to the target computer to perform a task on the target computer, the access request including the task, send an access token to the client computer to access the target computer to perform the task, receive the access token from the target computer for validation, and validate the received access token based on the request for the target computer to process the task. - View Dependent Claims (38, 39, 40)
-
-
41. A system, comprising:
-
a client computer in communication with a third party authority and a target computer; the client computer configured to; send a request including authentication information and an access request to the third party authority, receive an access token from the third party authority, send the access token to the target computer, and access the target computer to perform a task on the target computer. - View Dependent Claims (42, 43, 44, 45, 46, 47)
-
-
48. The system, comprising:
-
a target computer in communication with a third party authority and a client computer; the target computer configured to; receive an access token, send the access token to a third party authority for validation, receive validation from the third party authority to process a task, process the task, grant the client computer access to perform the task, spawn a thread to process the task, and send to the client computer an acknowledgement indicating a status of the task. - View Dependent Claims (49, 50, 51)
-
Specification