Remote computer system management through an FTP internet connection
First Claim
1. A method, comprising:
- determining at a local server whether a user is authorized to access a remote server;
when the user is authorized, identifying at the local server a first privilege level associated with the user, the identified first privilege level defining how the user is permitted to control an Operating System (OS) installed on the remote server;
logging the local server onto the OS, the logon using a generic account that provides the local server a second different privilege level for accessing the OS on the remote server, the generic account being non-corresponding with the identified first privilege level, wherein the generic account does not restrict privileges according to the identified first privilege level and the local server imposes administrative privilege level restrictions on the user, and the generic account allows multiple users access to the remote server through a single account logon;
receiving at the local server one or more commands entered through a web browser associated with the user, wherein the commands are configured to allow the user to administer the remote server through the web browser without requiring direct access to the remote server, and wherein the commands are configured to establish, run and manage files on the OS;
filtering the commands received at the local server according to a verification of whether the received commands correspond to the identified first privilege level for the user;
sending messages that represent the filtered commands from the local server, over a packet switched network, and to the remote server when the filtered commands correspond to the identified first privilege level;
wherein at least one of the received commands is blocked through the filtering by the local server, the blocked command being one that is permissible under the second privilege level such that said filtering and sending by the local server simulates user OS logon using a user account having the identified first privilege level while the local server is actually logged onto, and accessing, the remote server using the generic account having the second privilege level; and
creating a session log identifying the commands represented by the messages, the session log containing information to allow a system administrator to undo transactions performed on the OS, wherein the transactions alter a file system stored on the remote server and the session log contains information to allow the system administrator to rebuild the file system.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for remote computer systems management through an FTP Internet connection. A user operating on a remote client issues requests to the host server. These requests are first sent to an FTP server which enforces security measures. Upon authentication, the FTP server issues appropriate commands and then passes these commands on to the operation system of the host server through an FTP transfer. The commands perform standard features of the operation system which are not normally allowable by traditional FTP. Responses are sent back through the FTP server to the original requestor'"'"'s remote client computer. A web-based management application may be used to provide an intuitive, user-friendly graphical user interface to be operated in conjunction with a web browser on the local client computer. The user submits requests through this web control panel to initiate operations to be executed on the remote operating system of the host server. These HTTP web requests are initially transmitted to a web server a which processes the HTTP requests and then submits the requests to the FTP server by establishing an IP connection. Likewise, responses sent back through the FTP server are passed on to the web server and reported to the user through HTML over HTTP to the original user'"'"'s web browser for display.
149 Citations
12 Claims
-
1. A method, comprising:
-
determining at a local server whether a user is authorized to access a remote server; when the user is authorized, identifying at the local server a first privilege level associated with the user, the identified first privilege level defining how the user is permitted to control an Operating System (OS) installed on the remote server; logging the local server onto the OS, the logon using a generic account that provides the local server a second different privilege level for accessing the OS on the remote server, the generic account being non-corresponding with the identified first privilege level, wherein the generic account does not restrict privileges according to the identified first privilege level and the local server imposes administrative privilege level restrictions on the user, and the generic account allows multiple users access to the remote server through a single account logon; receiving at the local server one or more commands entered through a web browser associated with the user, wherein the commands are configured to allow the user to administer the remote server through the web browser without requiring direct access to the remote server, and wherein the commands are configured to establish, run and manage files on the OS; filtering the commands received at the local server according to a verification of whether the received commands correspond to the identified first privilege level for the user; sending messages that represent the filtered commands from the local server, over a packet switched network, and to the remote server when the filtered commands correspond to the identified first privilege level; wherein at least one of the received commands is blocked through the filtering by the local server, the blocked command being one that is permissible under the second privilege level such that said filtering and sending by the local server simulates user OS logon using a user account having the identified first privilege level while the local server is actually logged onto, and accessing, the remote server using the generic account having the second privilege level; and creating a session log identifying the commands represented by the messages, the session log containing information to allow a system administrator to undo transactions performed on the OS, wherein the transactions alter a file system stored on the remote server and the session log contains information to allow the system administrator to rebuild the file system. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A local server, comprising:
-
one or more processors; and a memory coupled to the processors comprising instructions executable by the processors the processors operable when executing the instructions to; determine whether a user is authorized to access a remote server; when the user is authorized, identify a first privilege level associated with the user, the identified first privilege level defining how the user is permitted to control an Operating System (OS) installed on the remote server; log the local server onto the OS, the logon using a generic account that provides the local server a second different privilege level for accessing the OS on the remote server, the generic account being non-corresponding with the identified first privilege level, wherein the generic account does not restrict privileges according to the identified first privilege level and the local server is configured to impose administrative privilege level restrictions on the user, and the generic account allows multiple users access to the remote server through a single account logon; receive one or more commands entered through a web browser associated with the user, wherein the commands are configured to allow the user to administer the remote server through the web browser without requiring direct access to the remote server, and wherein the commands are configured to establish, run and manage files on the OS; filter the received commands according to a verification of whether the received commands correspond to the identified first privilege level for the user; send messages that represent the filtered commands from the local server, over a packet switched network, and to the remote server when the filtered commands correspond to the identified first privilege level; wherein at least one of the received commands is blocked through the filtering by the local server, the blocked command being one that is permissible under the second privilege level such that said filtering and sending by the local server simulates user OS logon using a user account having the identified first privilege level while the local server is actually logged onto, and accessing, the remote server using the generic account having the second privilege level; and create a session log identifying the commands represented by the messages, the session log containing information to allow a system administrator to undo transactions performed on the OS, wherein the transactions alter a file system stored on the remote server and the session log contains information to allow the system administrator to rebuild the file system. - View Dependent Claims (7, 8, 9, 10, 11, 12)
-
Specification