Database for access control center
First Claim
1. A system of managing information used for controlling access by technical support personnel to a company'"'"'s computing system, the system comprising:
- at least one subsystem configured to store identification information for the technical support personnel in a first main data table, the technical support personnel being physically and logically isolated from the company'"'"'s computing system;
at least one subsystem configured to store access approval information for the technical support personnel in a second main data table, the access approval authorizing the technical support personnel to access a portion of the company'"'"'s computing system that is affected by a technical support incident; and
at least one subsystem configured to use the identification information and the access approval information stored in the first main data table and the second main data table to allow the technical support personnel to access the portion of the company'"'"'s computing system affected by the technical support incident through a thin client terminal that has a limited functionality and a reduced set of applications; and
at least one subsystem that sends a description of the technical support incident to the thin client terminal.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods and systems are disclosed for providing a database schema that links various system components and information to provide oversight and automated access control across disparate systems and applications. In one implementation, the database schema may use separate centralized tables to tie the various system components and information together. For example, one table may store information concerning technical support personnel authorized to address a given technical support incident, and another table may store information concerning approval given to do the technical support personnel to access a resource needed to provide the technical support, and the level of access needed to address provide technical support. Auxiliary tables may then be provided to support the centralized tables. Such an arrangement has a number of advantages, including the ability to allow the technical support personnel to access user ID-protected and/or password-protected systems/applications without using or knowing the user IDs and passwords.
-
Citations
21 Claims
-
1. A system of managing information used for controlling access by technical support personnel to a company'"'"'s computing system, the system comprising:
-
at least one subsystem configured to store identification information for the technical support personnel in a first main data table, the technical support personnel being physically and logically isolated from the company'"'"'s computing system; at least one subsystem configured to store access approval information for the technical support personnel in a second main data table, the access approval authorizing the technical support personnel to access a portion of the company'"'"'s computing system that is affected by a technical support incident; and at least one subsystem configured to use the identification information and the access approval information stored in the first main data table and the second main data table to allow the technical support personnel to access the portion of the company'"'"'s computing system affected by the technical support incident through a thin client terminal that has a limited functionality and a reduced set of applications; and at least one subsystem that sends a description of the technical support incident to the thin client terminal. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method of managing information used for controlling access by technical support personnel to a company'"'"'s computing system, the method comprising:
-
storing identification information for the technical support personnel in a first main data table, the technical support personnel being physically and logically isolated from the company'"'"'s computing system; storing access approval information for the technical support personnel in a second main data table, the access approval authorizing the technical support personnel to access a portion of the company'"'"'s computing system that is affected by a technical support incident; using the identification information and the access approval information stored in the first main data table and the second main data table to allow the technical support personnel to access the portion of the company'"'"'s computing system affected by the technical support incident through a thin client terminal that has a limited functionality and a reduced set of applications; and sending a description of the technical support incident to the thin client terminal. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer-readable medium encoded with computer-readable instructions for managing information used for controlling access by technical support personnel to a company'"'"'s computing system, the computer-readable instructions comprising instructions for causing a computer to:
-
store identification information for the technical support personnel in a first main data table, the technical support personnel being physically and logically isolated from the company'"'"'s computing system; store access approval information for the technical support personnel in a second main data table, the access approval authorizing the technical support personnel to access a portion of the company'"'"'s computing system that is affected by a technical support incident; use the identification information and the access approval information stored in the first main data table and the second main data table to allow the technical support personnel to access the portion of the company'"'"'s computing system affected by the technical support incident through a thin client terminal that has a limited functionality and a reduced set of applications; and send a description of the technical support incident to the thin client terminal. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
Specification