Method for securely communicating remote control commands in a computer network
First Claim
1. A method for securely broadcasting remote control commands in a computer network including at least one targeted network computer capable of responding to remote control commands from a network administrator computer or other network computer, the method comprising the steps of:
- generating a remote control command;
creating a digital signature of the remote control command;
appending the digital signature to the remote control command to create a broadcast message; and
communicating the broadcast message to at least one targeted network computer.
4 Assignments
0 Petitions
Accused Products
Abstract
A method for providing secure remote control commands in a distributing computer environment. In the preferred embodiment of the invention, a network administrator or network management software creates a shutdown record, including an index or time stamp, for powering down a specified network computer(s). Prior to broadcast over the network, a secure one-way hash function is performed on the shutdown record. The result of the one-way hash function is encrypted using the network administrator'"'"'s private key, thereby generating a digital signature that can be verified by specially configured network nodes. The digital signature is appended to the original shutdown record prior to broadcast to the network. Upon receiving the broadcast message, the targeted network computer(s) validates the broadcast message by verifying the digital signature of the packet or frame. The validation process is performed by decrypting the hash value representation of the shutdown record using the network administrator'"'"'s public key. A one-way hash function is also performed on the original shutdown record portion of the received message. If the two values match, the broadcast message is determined to be authentic and the shutdown control code is executed. The invention insures that the shutdown command was neither modified in transit nor originated from an unauthorized source.
-
Citations
53 Claims
-
1. A method for securely broadcasting remote control commands in a computer network including at least one targeted network computer capable of responding to remote control commands from a network administrator computer or other network computer, the method comprising the steps of:
-
generating a remote control command; creating a digital signature of the remote control command; appending the digital signature to the remote control command to create a broadcast message; and communicating the broadcast message to at least one targeted network computer. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A computer system configured to receive secure network communications, the secure network communications having a remote control command and a digital signature, the computer system comprising:
-
a system bus; a processor coupled to the system bus; power management hardware or software; and network interface circuitry coupled to the system bus and the power management hardware or software, the network interface circuitry configured to perform or direct the steps of; utilizing the digital signature to verify that the broadcast message is authentic; and permitting the execution of the remote control command only if the broadcast message is authentic, wherein the remote control command causes a change in state in the power management hardware or software. - View Dependent Claims (18, 19, 20, 21, 22)
-
-
23. A computer system configured to broadcast secure computer network communications, the computer system comprising:
-
a system bus; a processor coupled to the system bus; a processor readable storage medium coupled to the system bus for directing the processor to perform the steps of generating a remote control command; creating a digital signature of the remote control command; and appending the digital signature to the remote control command to create a broadcast message; network interface circuitry coupled to the system bus, the network interface circuitry responsive to a command(s) from the processor to transmit the broadcast message to a computer network. - View Dependent Claims (24, 25, 26, 27)
-
-
28. A computer system configured to receive secure network communications, the secure network communications having a remote control command and a digital signature, the computer system comprising:
-
a system bus; a processor coupled to the system bus; a mass storage device coupled to the system bus; power management hardware or software; and network interface circuitry coupled to the system bus and the power management hardware or software, the network interface circuitry configured to perform or direct the steps of; utilizing the digital signature to verify that the broadcast message is authentic; and permitting the execution of the remote control command only if the broadcast message is authentic, wherein the remote control command causes a change in state in the power management hardware or software. - View Dependent Claims (29, 30, 31, 32)
-
-
33. A computer system configured to broadcast secure computer network communications, the computer system comprising:
-
a system bus; a processor coupled to the system bus; a mass storage device coupled to the system bus; a processor readable storage medium coupled to the system bus for directing the processor to perform the steps of; generating a remote control command; creating a digital signature of the remote control command; and appending the digital signature to the remote control command to create a broadcast message; network interface circuitry coupled to the system bus, the network interface circuitry responsive to a command(s) from the processor to transmit the broadcast message to a computer network. - View Dependent Claims (34, 35, 36, 37)
-
-
38. A method for securely broadcasting remote control commands in a computer network including at least one targeted network computer capable of responding remote control commands from a network administrator computer or other network computer and capable of power management, the method comprising the steps of:
-
generating a remote control command for power management; creating a digital signature of the remote control command; appending the digital signature to the remote control command to create a broadcast message; communicating the broadcast message to at least one targeted network computer; and changing the state of power management hardware or software in the targeted network computer responsive to the remote control command only if the broadcast message is authentic. - View Dependent Claims (39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53)
-
Specification