Method and apparatus for restricting outbound access to remote equipment
First Claim
1. A method of accessing a remote device on a communications network, said method comprising the steps of:
- receiving a first challenge from the remote device;
transmitting the first challenge to a centralized token generator;
receiving a second challenge from the centralized token generator for access control;
transmitting a response to the second challenge to the centralized token generator;
obtaining a token for accessing the remote device if the response to the second challenge is correct;
transmitting the token to the remote device as a response to the first challenge; and
obtaining access to the remote device if the response to the first challenge is correct.
19 Assignments
0 Petitions
Accused Products
Abstract
A centralized token generating server is disclosed for limiting access to remote equipment. The token generating server provides outgoing authentication of a user, before permitting the user to leave the network environment to access remote equipment. The token generating server generates responses (tokens) for authorized users to satisfy challenges posed by remote equipment and maintains a log of all processed transactions. The token generating server provides an initial outbound access control, whenever a user desires to leave the network environment to access remote equipment, and the remote equipment performs a secondary authorization to ensure that a given user can access the given remote equipment. Each attempt by a user to obtain token-regulated access to remote equipment requires two token management sessions. During a token acquisition process, the user establishes a first session with the token generating server to obtain an access token to obtain access to a given piece of remote equipment. The initial session terminates once the token is acquired and the user accesses the remote equipment. Once the user has completed accessing the remote equipment, a second session is established between the user and the token generating server to terminate the session. An access transaction is complete when the active session is terminated and the token generating server is notified.
351 Citations
36 Claims
-
1. A method of accessing a remote device on a communications network, said method comprising the steps of:
-
receiving a first challenge from the remote device; transmitting the first challenge to a centralized token generator; receiving a second challenge from the centralized token generator for access control; transmitting a response to the second challenge to the centralized token generator; obtaining a token for accessing the remote device if the response to the second challenge is correct; transmitting the token to the remote device as a response to the first challenge; and obtaining access to the remote device if the response to the first challenge is correct. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method of restricting access to a remote device on a communications network, said method comprising the steps of:
-
receiving a first challenge issued by the remote device from a remote user attempting to access said remote device; transmitting a second challenge to the remote user for access control; receiving a response to the second challenge from the remote user; and transmitting a token to the remote user if the response to the second challenge is correct, said token being used as a response to the first challenge to obtain access to the remote device. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A user method for accessing a remote device on a communications network, said method comprising the steps of:
-
receiving a challenge from the remote device; transmitting the challenge to a centralized token generator; obtaining a token for accessing the remote device from the centralized token generator if the centralized token generator authenticates said user; transmitting the token to the remote device as a response to the challenge; and obtaining access to the remote device if the response to the challenge is correct. - View Dependent Claims (22, 23, 24, 25)
-
-
26. A centralized token generator for restricting access to a remote device on a communications network, comprising:
-
an input for receiving a challenge issued by the remote device from a remote user attempting to access said remote device; a processor for calculating a token if said remote user is authorized to access said remote device; and an output for transmitting said token to the remote user, said token being used by said remote user as a response to the challenge to obtain access to the remote device. - View Dependent Claims (27, 28, 29, 30, 31, 32, 33, 34, 35, 36)
-
Specification