Secure computer support system
First Claim
Patent Images
1. A method to maintain a first computer using a second computer and a central computer, the method comprising:
- receiving at a central computer a request for maintenance from a first computer, the first computer residing inside of a first secured area behind firewalls, proxy servers or private Internet addresses;
establishing a persistent connection between the first computer and the central computer;
the central computer determining for the first computer an appropriate second computer to provide maintenance to the first computer, the second computer residing inside a second secured area behind firewalls, proxy servers or private Internet addresses, and the central computer residing outside the first secured area and residing outside the second secured area;
in response to initiation by the central computer, opening a secure connection between a second computer and the central computer;
transferring, in response to the request for maintenance, a request for data from the second computer to the first computer through the central computer; and
transferring the data from the first computer to the second computer.
4 Assignments
0 Petitions
Accused Products
Abstract
A system maintains a first computer using a second computer and a central computer by: receiving a request for maintenance from a first computer; opening first and second secured connections to the first and second computers through the central computer; transferring a request for data from the second computer; storing data and a destination instruction sent from the second computer in a central computer buffer; and forwarding the buffered data to the first computer.
-
Citations
27 Claims
-
1. A method to maintain a first computer using a second computer and a central computer, the method comprising:
-
receiving at a central computer a request for maintenance from a first computer, the first computer residing inside of a first secured area behind firewalls, proxy servers or private Internet addresses;
establishing a persistent connection between the first computer and the central computer;
the central computer determining for the first computer an appropriate second computer to provide maintenance to the first computer, the second computer residing inside a second secured area behind firewalls, proxy servers or private Internet addresses, and the central computer residing outside the first secured area and residing outside the second secured area;
in response to initiation by the central computer, opening a secure connection between a second computer and the central computer;
transferring, in response to the request for maintenance, a request for data from the second computer to the first computer through the central computer; and
transferring the data from the first computer to the second computer. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
registering the first computer with the central computer;
identifying the first computer with an address; and
using the address, enabling the transfer of the request for data from the second computer to the first computer.
-
-
13. The method of claim 1, further comprising:
-
transferring a request for configuration and maintenance data from the second computer to the first computer through the central computer; and
transferring the configuration and maintenance data from the first computer to the second computer.
-
-
14. A system with an apparatus adapted to maintain one or more computers, comprising:
-
a first computer residing inside a first secured area behind firewalls, proxy servers or private Internet addresses;
a nexus to initiate and support a persistent connection with the first computer in response to receiving a re-guest for maintenance from the first computer, the nexus determining an appropriate second computer to provide maintenance to the first computer, and establishing a secured communication session between the first computer and the second computer, wherein the second computer resides inside a second secured area behind firewalls, proxy servers or private Internet addresses, and wherein the nexus resides outside of the first secured area and outside the second secured area. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25)
-
-
26. A nexus adapted to establish a through connection between a first and second computer, the nexus operable to run:
-
a registration process operable to register a first computer and save registration information upon receiving a maintenance request from the first computer, the first computer residing inside a first secured area behind firewalls, proxy servers or private Internet addresses;
a first connection process operable to open a persistent connection between the nexus and the first computer;
a second connection process operable to determine for the first computer an appropriate second computer to provide maintenance to the first computer, and establish, upon initiation by the central computer, a secure connection between the second computer and the nexus, the second computer residing outside of the first secured area, inside a second secured area behind firewalls, proxy servers or private Internet addresses, the nexus residing outside the first secured area and the second secured areas;
a third connection process operable to use the registration information to establish a through, persistent connection between the first and second computers.
-
-
27. A method to maintain a first computer using a second computer and a central computer, the central computer:
-
receiving a request for maintenance from a first computer, the first computer residing inside of a first secured area;
establishing a persistent connection between the first computer and the central computer;
determining an appropriate second computer to provide maintenance to the first computer;
opening a secured connection between the central computer and the second computer, the second computer residing outside of the first secured area inside a second secured area and the central computer residing between the first and second secured areas, the first and second secured areas residing behind firewalls, proxy servers or private Internet addresses;
transferring the request for maintenance from the first computer to the second computer and providing a response to the first computer from the second computer.
-
Specification