SECURE NETWORK SYSTEM REQUEST SUPPORT VIA A PING REQUEST
First Claim
1. A method, implemented by a remote computing system programmed to perform the following, comprising:
- sending, by the remote computing system, a query over a network to a target computing system;
determining whether the target computing system is non-responsive to the query; and
when the target computing system is non-responsive to the query, sending a ping request to the target computing system over the network, wherein the ping request comprises a key and a command to be performed by the target computing system.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods and systems for secure network system request (sysrq) via Internet Control Message Protocol (ICMP) are described. A remote computing system sends a query over a network to a target computing system and determines whether the target computing system is non-responsive to the query. When the target computing system is non-responsive to the query, the remote computing system sends an ICMP request to the target computing system over the network. The ping request includes a command to be performed by the target computing system and a key to verify authorization to perform the command.
49 Citations
35 Claims
-
1. A method, implemented by a remote computing system programmed to perform the following, comprising:
-
sending, by the remote computing system, a query over a network to a target computing system; determining whether the target computing system is non-responsive to the query; and when the target computing system is non-responsive to the query, sending a ping request to the target computing system over the network, wherein the ping request comprises a key and a command to be performed by the target computing system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 25)
-
-
15. A method, implemented by a target computing system programmed to perform the following, comprising:
-
receiving, at the target computing system, a ping request from a remote computing system over a network, wherein the ping request comprises a command to be performed by the target computing system and a key to verify authorization to perform the command; verifying the key of the ping request against a key stored in memory to authorize the command; and performing the command when the key of the ping request is verified. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23, 24, 26)
-
-
27. A non-transitory computer readable storage medium including instructions that, when executed by a remote computing system, cause the remote computing system to perform a method comprising:
-
sending, by the remote computing system, a query over a network to a target computing system; determining whether the target computing system is non-responsive to the query; and when the target computing system is non-responsive to the query, sending a ping request to the target computing system over the network, wherein the ping request comprises a command to be performed by the target computing system and a key to verify authorization to perform the command. - View Dependent Claims (28)
-
-
29. A non-transitory computer readable storage medium including instructions that, when executed by a target computing system, cause the target computing system to perform a method comprising:
-
receiving, at the target computing system, a key from a console associated with the target computing system; storing the key in memory of the target computing system; subsequently receiving, at the target computing system, a ping request from a remote computing system over a network, wherein the ping request comprises a command to be performed by the target computing system and a key to verify authorization to perform the command; verifying the key of the ping request against the key stored in memory to authorize the command; and performing the command when the key of the ping request is verified. - View Dependent Claims (30)
-
-
31. A target computing system, comprising:
-
a data storage device; and a processing device, coupled to the data storage device, to execute a secure network system request (sysrq) module, wherein the secure network sysrq module is configured to; receive, at the target computing system, a key from a console associated with the target computing system; store the key in memory of the target computing system; subsequently receive, at the target computing system, a ping request from a remote computing system over a network, wherein the ping request comprises a command to be performed by the target computing system and a key to verify authorization to perform the command; verify the key of the ping request against the key stored in memory to authorize the command; and perform the command when the key of the ping request is verified. - View Dependent Claims (32, 33)
-
-
34. A method, implemented by a remote computing system programmed to perform the following, comprising:
-
communicating with a target computing system over a network by the remote computing system; and sending a ping request to the target computing system over the network, wherein the ping request comprises a key and a command to be performed by the target computing system. - View Dependent Claims (35)
-
Specification