Method and apparatus for providing temporary access to a network device
First Claim
1. A machine-implemented method for providing access to one or more resources of a network device, the method comprising:
- receiving input from a first user, wherein the input is shared with a second user;
generating a first password for said resources of said network device based at least in part on (a) said input from the first user, and (b) an algorithm, wherein said algorithm is always, during the steps of the method, concealed from said first user, and wherein said first password is always, during the steps of the method, concealed from said first user;
receiving a second password from the second user, wherein said second password is generated based at least in part on (a) said input from the first user, and (b) said algorithm, wherein said algorithm is known to said second user, and wherein said second password is always, during the steps of the method, concealed from said first user;
determining whether said first password matches said second password; and
in response to determining that said first password matches said second password, providing said second user with access to said one or more resources of said network device;
wherein the first user and the second user are different users in different locations;
wherein the method is performed by one or more computing devices.
2 Assignments
0 Petitions
Accused Products
Abstract
A method and apparatus for providing access to resources of a network device is provided. A user instructs a network device to generate a user password that is concealed from the user of the network device. The network device generates the user password based on, at least in part, public input provided by the user, and an algorithm which is concealed from the user, but known to a support service provider. The user communicates the public input to the support service provider. The support service provider uses the public input to generate a provider password based on, at least in part, the algorithm. The support service provider may access the network device via a network by providing the provider password to the network device. If the provider password matches the user password generated, then the support service provider is granted access to resources of the network device.
-
Citations
27 Claims
-
1. A machine-implemented method for providing access to one or more resources of a network device, the method comprising:
-
receiving input from a first user, wherein the input is shared with a second user; generating a first password for said resources of said network device based at least in part on (a) said input from the first user, and (b) an algorithm, wherein said algorithm is always, during the steps of the method, concealed from said first user, and wherein said first password is always, during the steps of the method, concealed from said first user; receiving a second password from the second user, wherein said second password is generated based at least in part on (a) said input from the first user, and (b) said algorithm, wherein said algorithm is known to said second user, and wherein said second password is always, during the steps of the method, concealed from said first user; determining whether said first password matches said second password; and in response to determining that said first password matches said second password, providing said second user with access to said one or more resources of said network device; wherein the first user and the second user are different users in different locations; wherein the method is performed by one or more computing devices. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A storage device storing one or more sequences of instructions for providing access to resources of a network device, wherein execution of the one or more sequences of instructions by one or more processors causes the one or more processors to perform the steps of:
-
receiving input from a first user, wherein the input is shared with a second user; generating a first password for said resources of said network device based at least in part on (a) said input from the first user, and (b) an algorithm, wherein said algorithm is always, during said steps, concealed from said first user, and wherein said first password is always, during said steps, concealed from said first user; receiving a second password from the second user, wherein said second password is generated based at least in part on (a) said input from the first user, and (b) said algorithm, wherein said algorithm is known to said second user, and wherein said second password is always, during said steps, concealed from said first user; determining whether said first password matches said second password; and in response to determining that said first password matches said second password, providing said second user with access to said one or more resources of said network device; wherein the first user and the second user are different users in different locations. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. An apparatus comprising:
-
one or more processors; and a memory coupled to the one or more processors, the memory containing one or more sequences of instructions for providing access to one or more resources of a network device, wherein execution of the one or more sequences of instructions by the one or more processors causes the one or more processors to perform the steps of; receiving input from a first user, wherein the input is shared with a second user; generating a first password for said resources of said network device based at least in part on (a) said input from the first user, and (b) an algorithm, wherein said algorithm is always, during said steps, concealed from said first user, and wherein said first password is always, during said steps, concealed from said first user; receiving a second password from the second user, wherein said second password is generated based at least in part on (a) said input from the first user, and (b) said algorithm, wherein said algorithm is known to said second user, and wherein said second password is always, during said steps, concealed from said first user; determining whether said first password matches said second password; and in response to determining that said first password matches said second password, providing said second user with access to said one or more resources of said network device; wherein the first user and the second user are different users in different locations. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26, 27)
-
Specification