Method and system for tracking computer system usage through a remote access security device
First Claim
1. In a system for providing secure remote access between a plurality of unrelated host computer networks and a plurality of authorized users via a network access server, a method of monitoring access to each of the unrelated host computer networks comprising the steps of:
- maintaining a list of host computer networks and an associated list of authorized users for each host computer network in a first memory device;
automatically creating a starting time stamp at the beginning of a remote access call received from an authorized user at a communication server and connecting the authorized user to an appropriate one of the plurality of unrelated host computer networks after determining at the network access server that the authorized user is authorized to connect to the appropriate one of the plurality of unrelated host computer networks;
automatically creating an ending time stamp at a conclusion of the remote access call;
storing the starting and ending time stamps for the remote access call in a user log in the network access server, the starting and ending time stamps associated with the list of authorized users whereby the user log contains a record of computer time usage for each authorized user;
transmitting the user log from the network access server to a billing computer;
transmitting the list of host computer networks and the associated list of authorized users for each host computer network from the first memory device to the billing computer; and
generating a billing summary at the billing computer for each of the host computer networks.
4 Assignments
0 Petitions
Accused Products
Abstract
A system and method for monitoring remote computer access and associated costs is provided. The system includes a remotely located communication server in communication with multiple host computer networks and in communication with a network access server. First and second memory devices contain a list of authorized users for the host computer networks and a user log for use by a billing computer to generate bills. The method includes the steps of creating starting and ending time stamps for each authorized user accessing a respective one of the multiple host computer networks and creating a user log to generate bills and monitor host computer network usage.
141 Citations
13 Claims
-
1. In a system for providing secure remote access between a plurality of unrelated host computer networks and a plurality of authorized users via a network access server, a method of monitoring access to each of the unrelated host computer networks comprising the steps of:
-
maintaining a list of host computer networks and an associated list of authorized users for each host computer network in a first memory device;
automatically creating a starting time stamp at the beginning of a remote access call received from an authorized user at a communication server and connecting the authorized user to an appropriate one of the plurality of unrelated host computer networks after determining at the network access server that the authorized user is authorized to connect to the appropriate one of the plurality of unrelated host computer networks;
automatically creating an ending time stamp at a conclusion of the remote access call;
storing the starting and ending time stamps for the remote access call in a user log in the network access server, the starting and ending time stamps associated with the list of authorized users whereby the user log contains a record of computer time usage for each authorized user;
transmitting the user log from the network access server to a billing computer;
transmitting the list of host computer networks and the associated list of authorized users for each host computer network from the first memory device to the billing computer; and
generating a billing summary at the billing computer for each of the host computer networks. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
storing a list of telephone calls received at the help desk computer from authorized users, each telephone call in the list of telephone calls associated with an authorized user; and
transmitting the list of telephone calls to the billing computer.
-
-
4. The method of claim 3, wherein the step of generating a billing summary further comprises generating a list of usage charges and generating a list of help desk charges for each host computer network from the user log and the list of telephone calls.
-
5. The method of claim 4, wherein the step of generating a billing summary comprises generating a billing summary for each authorized user of each host computer network, the billing summary having a list of authorized users for the respective host computer network, an associated usage charge for each of the authorized users, and an associated list of telephone calls for each associated user.
-
6. The method of claim 1, further comprising:
-
receiving a long distance telephone company report of total time usage of a network access telephone number at the billing computer; and
determining a per user cost ratio for each of the authorized users of the host computer network using the network access telephone number from the long distance telephone company report and the user log.
-
-
7. The method of claim 1, wherein the list of host computer networks comprises a list of company departments, each company department associated with a predetermined number of authorized users and the step of generating a billing summary comprises calculating a total usage for each company department from the user log and the list of company departments.
-
8. The method of claim 7, wherein the list of host computer networks further comprises a fee schedule associated with each of the host computer networks, the fee schedule being a predetermined list of standard charges and the step of generating a billing summary comprises calculating a fee for each company department based on the fee schedule and the calculated total usage for each company department.
-
9. The method of claim 1 further comprising the step of transmitting each billing summary for each host computer network from the billing computer to the host computer networks, each billing summary directed to a respective one of the plurality of host computer networks.
-
10. The method of claim 9, wherein the step of transmitting each billing summary comprises sending the billing summary via e-mail.
-
11. The method of claim 9 wherein the step of transmitting each billing summary comprises sending each billing summary via facsimile from the billing computer.
-
12. In a system for providing secure remote access between a plurality of unrelated host computer networks and a plurality of authorized users via a network access server, a method of monitoring access to each of the unrelated host computer networks comprising the steps of:
-
maintaining a list of host computer networks and an associated list of authorized users for each host computer network in a first memory device;
receiving a remote access telephone call to a host computer network from a user computer of an authorized user at a communication server;
automatically creating a starting time stamp at the beginning of the remote access call received from an authorized user at the communication server and connecting the authorized user to an appropriate one of the plurality of unrelated host computer networks after determining at the network access server that the authorized user is authorized to connect to the appropriate one of the plurality of unrelated host computer networks;
automatically creating an ending time stamp when the user computer terminates the remote access call with the host computer;
storing the starting and ending time stamps for the remote access call in a user log in the network access server, the starting and ending time stamps associated with the list of authorized users whereby the user log contains a record of computer time usage for each authorized user;
transmitting the user log from the network access server to a billing computer;
transmitting the list of host computer networks and the associated list of authorized users for each host computer network from the first memory device to the billing computer; and
generating a billing summary at the billing computer for each of the host computer networks. - View Dependent Claims (13)
-
Specification