Detecting unauthorized computer access
First Claim
Patent Images
1. A machine executed method comprising:
- at a first computer, receiving from a second computer a request to gain root-administrator access to an operating system (OS) of the first computer;
the first computer, in response to receiving the request to gain root-administrator access, granting the root-administrator access and modifying stored access state data from a first state associated with the OS to a second state associated with the OS, wherein the second state is different than the first state and the second state indicates that root-administrator access to the OS was granted;
after the root-administrator access is terminated, maintaining the stored access state data in the second state to continue to indicate that root-administrator access to the OS was granted.
1 Assignment
0 Petitions
Accused Products
Abstract
A machine executed method comprising at a first computer, receiving from a second computer a request to gain root-administrator access to an operating system (OS) of the first computer; the first computer, in response to receiving the request to gain root-administrator access, granting the root-administrator access and modifying stored access state data from a first state associated with the OS to a second state associated with the OS, wherein the second state is different than the first state and the second state indicates that root-administrator access to the OS was granted.
-
Citations
22 Claims
-
1. A machine executed method comprising:
-
at a first computer, receiving from a second computer a request to gain root-administrator access to an operating system (OS) of the first computer; the first computer, in response to receiving the request to gain root-administrator access, granting the root-administrator access and modifying stored access state data from a first state associated with the OS to a second state associated with the OS, wherein the second state is different than the first state and the second state indicates that root-administrator access to the OS was granted; after the root-administrator access is terminated, maintaining the stored access state data in the second state to continue to indicate that root-administrator access to the OS was granted. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 16, 17)
-
-
10. A computer comprising:
-
operating system logic comprising a command interface that provides one command configured to process requests to obtain root-administrator shell access, and an encrypted filesystem; access state data stored in the encrypted filesystem; access logic coupled to the operating system logic and coupled to the access state data, wherein the access logic is configured upon execution to cause the computer to perform; receiving from a second computer a request to gain root-administrator access to the operating system logic of the first computer; in response to receiving the request to gain root-administrator access, granting the root-administrator access and modifying stored access state data from a first state associated with the operating system logic to a second state associated with the operating system logic, wherein the second state is different than the first state and the second state indicates that root-administrator access to the operating system logic was granted; after the root-administrator access is terminated, maintaining the stored access state data in the second state to continue to indicate that root-administrator access to the OS was granted. - View Dependent Claims (11, 12, 13, 14, 15)
-
-
18. A non-transitory computer-readable storage medium comprising one or more sequences of instructions which when executed cause one or more processors to perform:
-
at a first computer, receiving from a second computer a request to gain root-administrator access to an operating system (OS) of the first computer; the first computer, in response to receiving the request to gain root-administrator access, granting the root-administrator access and modifying stored access state data from a first state associated with the OS to a second state associated with the OS, wherein the second state is different than the first state and the second state indicates that root-administrator access to the OS was granted; after the root-administrator access is terminated, maintaining the stored access state data in the second state to continue to indicate that root-administrator access to the OS was granted. - View Dependent Claims (19, 20)
-
-
21. A method comprising:
-
at a first computer, receiving from a second computer a request to gain root-administrator access to an operating system (OS) of the first computer; the first computer, in response to receiving the request to gain root-administrator access, granting the root-administrator access and modifying stored access state data from a first state associated with the OS to a second state associated with the OS, wherein the second state is different than the first state and the second state indicates that root-administrator access to the OS was granted; after the root-administrator access is terminated, maintaining the stored access state data in the second state to continue to indicate that root-administrator access to the OS was granted; wherein the state data originally comprises a secret key value; requesting support services; receiving a request to provide a valid warranty verification number in consideration for receiving the support services; the first computer generating and displaying a warranty verification number on a display device that is coupled to the first computer, wherein the generating comprises one-way hash logic in the first computer processing at least the secret key, a current time, and a serial number associated with the first computer; providing the warranty verification number to a support services representative; a third computer associated with the support services generating and displaying a plurality of second warranty verification numbers by one-way hash logic in the third computer processing at least the secret key, a plurality of times that include the current time, and the serial number associated with the first computer; the support services determining whether one of the second warranty verification numbers matches the warranty verification number and providing the support services only when one of the second warranty verification numbers matches. - View Dependent Claims (22)
-
Specification