Method, system, and article of manufacture for remote management of devices
First Claim
Patent Images
1. A method for remotely managing devices, comprising:
- creating, by a first process, a second process, the first process and second process generated by an application executing on a client;
generating a cipher at the client by one of the first process or the second process, the generated cipher stored in a temporary file along with information related to accessing the generated cipher;
terminating the first process upon creating the second process; and
controlling access to the generated cipher in the temporary file, the temporary file being deleted upon completion of the application executing on the client;
wherein the second process communicates with other processes via an interprocess communication mechanism using the generated cipher, wherein the interprocess communication mechanism allows the second process to be accessed by other processes based on access information to the generated cipher in the temporary file, the method further including,selecting a scripting language;
determining a first command in a script written in the scripting language; and
establishing a network session connecting the client and a server with the second process, wherein the first process is created by executing the first command at the client.
2 Assignments
0 Petitions
Accused Products
Abstract
Provided are a method, system, and article of manufacture. A first process creates a second process. A cipher is generated. The first process is terminated. Access is controlled to the generated cipher.
12 Citations
10 Claims
-
1. A method for remotely managing devices, comprising:
-
creating, by a first process, a second process, the first process and second process generated by an application executing on a client; generating a cipher at the client by one of the first process or the second process, the generated cipher stored in a temporary file along with information related to accessing the generated cipher; terminating the first process upon creating the second process; and controlling access to the generated cipher in the temporary file, the temporary file being deleted upon completion of the application executing on the client; wherein the second process communicates with other processes via an interprocess communication mechanism using the generated cipher, wherein the interprocess communication mechanism allows the second process to be accessed by other processes based on access information to the generated cipher in the temporary file, the method further including, selecting a scripting language; determining a first command in a script written in the scripting language; and establishing a network session connecting the client and a server with the second process, wherein the first process is created by executing the first command at the client. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. An article of manufacture for remotely managing devices, wherein the article of manufacture is capable of causing operations, the operations comprising:
-
creating, by a first process, a second process, and the second process communicates with other processes via an interprocess communication mechanism, such that the interprocess communication mechanism allows the second process to be accessed by other processes, the first process and second process generated by an application executing on a client; generating a cipher at the client by one of the first process or the second process, the generated cipher stored in a temporary file along with information related to accessing the generated cipher; terminating the first process upon creating the second process; controlling access to the generated cipher in the temporary file; authorizing only processes that are permitted to read the generated cipher to access the second process, allowing access to the generated cipher to a third process based on the access information, and encrypting with the stored cipher a message from the third process to the second process; and
wherein the authorization further includes,receiving a message at the second process from third process; decrypting the received message with the generated cipher; determining if the decrypted message is valid; if the decrypted message is valid, then allowing the third process to access the second process; and if the decrypted message is invalid, then preventing the third process from accessing the second process; wherein the temporary file storing the generated cipher is deleted upon completion of the application. - View Dependent Claims (8, 9, 10)
-
Specification