Security and report generation system for networked multimedia workstations
First Claim
1. In a networked computer system having at least one master workstation and a plurality of network workstations, a method for validating the master workstation to a network workstation in response to a denial of access by the network workstation, comprising the steps of:
- storing a plurality of candidate passwords at the master workstation; and
automatically transmitting the candidate passwords to the network workstation in succession until one of said passwords is accepted at the network workstation.
2 Assignments
0 Petitions
Accused Products
Abstract
A method for providing security in a networked multimedia computing system is provided wherein an administrative workstation is challenged by a network workstation when the administrative workstation is attempting to manipulate or query the network workstation. The administrative workstation responds in an automatic fashion to supply a series of logically acceptable password candidates to the challenging workstation in an attempt to validate itself to the challenging network workstation without interrupting a user. If none of the series of passwords is successful, an administrator, or user, operating the administrative workstation is prompted to manually enter a password. The system allows for an administrative workstation to automatically and transparently validate itself to a challenging network workstation, in most situations, without requiring input from the administrator. Another aspect of the invention involves a system for generating reports concerning user-selected hardware and software attributes for one or more network workstations.
-
Citations
25 Claims
-
1. In a networked computer system having at least one master workstation and a plurality of network workstations, a method for validating the master workstation to a network workstation in response to a denial of access by the network workstation, comprising the steps of:
-
storing a plurality of candidate passwords at the master workstation; and automatically transmitting the candidate passwords to the network workstation in succession until one of said passwords is accepted at the network workstation. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. In a networked computer system, a method for providing security in a network workstation, comprising the steps of:
-
monitoring request messages from a master workstation; determining whether the master workstation is suspect; issuing a validation challenge to the master workstation in response to a request message if the master workstation is found to be suspect; and assessing the validity of each password in a series of password candidates automatically sent by the master workstation to the network workstation in response to the challenge. - View Dependent Claims (12, 13)
-
-
14. In a networked computer system, a method for validating a master workstation, the method comprising the steps of:
-
sending a request message from the master workstation to a network workstation; determining, within the network workstation, whether a the master workstation requires validation before a task associated with the request message is carried out; issuing a challenge to the master workstation if the master workstation is determined to require validation; and automatically sending a series of password candidates from the master workstation to the network workstation in response to the challenge. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21)
-
-
22. In a networked computer system, a method for validating a master workstation, the method comprising the steps of:
-
issuing a challenge message to the master workstation when the network workstation wants to send a request message to the master workstation; automatically sending a series of one or more password candidates from the master workstation to the network workstation in response to the challenge message; and determining, within the network workstation, whether any of the series of password candidates are valid.
-
-
23. In a networked computer system having at least one master workstation and a multiplicity of network workstations, a method for maintaining an active link between the master workstation and the network workstations, comprising the steps of:
-
broadcasting a request message from the master workstation to a network workstation; receiving the request message in the network workstation; determining whether a predetermined amount of time has elapsed since a previous status request message was received; sending a challenge message to the master workstation in response to the status request if the predetermined period amount of time has elapsed; responding to the challenge message by automatically returning a stored password maintained in the master workstation which stored password is particular to the network workstation issuing the challenge message; responding to the challenge message by automatically returning a null password if the stored password is not accepted; responding to the challenge message by automatically returning an administrative password associated with the master workstation if the null password is not accepted; and prompting a user operating the master workstation to enter a password if the administrative password associated is not accepted.
-
-
24. A system for providing security in a network workstation, the system comprising:
-
means for monitoring request messages from a master workstation; means for determining whether a the master workstation is suspect; means for issuing a validation challenge to the master workstation in response to a status request message if the master workstation is found to be suspect; and means for monitoring a series of password candidates automatically sent by the master workstation to the network workstation in response to the validation challenge.
-
-
25. An article of manufacture for use in a network workstation comprising a computer usable medium having computer readable program code means for causing the network workstation to:
-
monitor request messages from a master workstation; determine whether a the master workstation is suspect; issue a validation challenge to the master workstation in response to a status request message if the master workstation is found to be suspect; and monitoring a series of password candidates automatically sent by the master workstation to the network workstation in response to the validation challenge.
-
Specification