SYSTEM AND METHOD FOR SECURE ACCESS OF A REMOTE SYSTEM
First Claim
1. A system for automating a login/authentication of at least one network device comprising:
- a server comprising a first web server and a first database configured to maintain device login/authentication credentials, wherein the server is configured as a host for a network monitoring program and provides a secure means of communication to at least one remote device;
a communication means for transmitting data between the server and the at least one network device; and
a network monitoring program on both the centrally located server and remote server, wherein the network monitoring program automates device login/authentication and masks data relating to the login/authentication.
3 Assignments
0 Petitions
Accused Products
Abstract
A system and method for providing a user with secure access to devices operatively connected to a network comprising at least one processing device that has access to a database. The database maintains information for each user of the system, such as the user'"'"'s login credentials and access level or permissions, along with information corresponding to each network device, such as, for example, the device'"'"'s login credentials, IP address, and port settings. The processing device authenticates each user and then provides each user with access to the network devices as defined by the data maintained in the database corresponding to the respective user and the network devices.
-
Citations
22 Claims
-
1. A system for automating a login/authentication of at least one network device comprising:
-
a server comprising a first web server and a first database configured to maintain device login/authentication credentials, wherein the server is configured as a host for a network monitoring program and provides a secure means of communication to at least one remote device; a communication means for transmitting data between the server and the at least one network device; and a network monitoring program on both the centrally located server and remote server, wherein the network monitoring program automates device login/authentication and masks data relating to the login/authentication. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A system for a single login provided by a user during a network monitoring login/authentication process that determines an appropriate and corresponding level of permissible access to any given device credentials located in a database, comprising:
-
a network monitoring software login/authentication credential that is validated against user accounts of a web application; a server comprising the database of device login/authentication credentials, wherein the server acts as a host for a network monitoring program and the web application; and a web server that provides a secure means of communication to the database;
whereinthe database comprises users, device locations, device login/authentication credentials, device login methodology, port settings, user login/authentication credentials, user action logs, user'"'"'s network access level permission that is secured from unauthorized access.
-
-
20. A method for providing a user with secure remote access to a network device, the method comprising the steps of:
-
when the user requests access to the network device from within a web application, forwarding the request to a database by the web application via a first secure means of communication; logging and/or authenticating the user into the network device; and redirecting a response from the network device via a second secure means of communication to the user granting the user device level access without the user gaining knowledge of at least one of the group comprising login/authentication, IP access or address, and a port setting(s) of the network device. - View Dependent Claims (21, 22)
-
Specification