Keystroke logger for Unix-based systems
First Claim
Patent Images
1. A method comprising:
- receiving, from an Internet program manager (IPM) server and by a demilitarized (DMZ) log server, a user identification (ID) of a user associated with a user device and an Internet protocol (IP) address of the user device;
connecting the computing device to the user device based on the user ID and the IP address of the user device;
receiving, from the IPM server and by the DMZ log server, a request to execute a logging application that records one or more inputs or one or more outputs associated with the user device;
executing, by the DMZ log server, the logging application based on the request, an IP address of a target device, the user ID, and the IP address of the user device;
receiving, by the DMZ log server and via the logging application, the one or more inputs or the one or more outputs; and
recording, by the DMZ log server, the one or more inputs or the one or more outputs.
1 Assignment
0 Petitions
Accused Products
Abstract
A device receives, from an Internet program manager (IPM) server, an identification (ID) of a user associated with a user device and an Internet protocol (IP) address of the user device, and connects to the user device based on the user ID and the IP address of the user device. The device also receives, from the IPM server, a request to execute a logging application for the user device, and executes the logging application based on the request. The device further receives, via the logging application, one or more inputs or outputs associated with the user device, and records the one or more inputs or outputs associated with the user device.
-
Citations
23 Claims
-
1. A method comprising:
-
receiving, from an Internet program manager (IPM) server and by a demilitarized (DMZ) log server, a user identification (ID) of a user associated with a user device and an Internet protocol (IP) address of the user device; connecting the computing device to the user device based on the user ID and the IP address of the user device; receiving, from the IPM server and by the DMZ log server, a request to execute a logging application that records one or more inputs or one or more outputs associated with the user device; executing, by the DMZ log server, the logging application based on the request, an IP address of a target device, the user ID, and the IP address of the user device; receiving, by the DMZ log server and via the logging application, the one or more inputs or the one or more outputs; and recording, by the DMZ log server, the one or more inputs or the one or more outputs. - View Dependent Claims (2, 3, 4, 5, 6, 22, 23)
-
-
7. A method comprising:
-
receiving, by a computing device, login information from a user device associated with a user; determining, by the computing device, a user identification (ID) of the user and an Internet protocol (IP) address of the user device based on the login information; receiving, by the computing device and from the user device, a name and an IP address of a target device to be connected to the user device; requesting, by the computing device, connection of the user device to the target device via a demilitarized (DMZ) log server and based on the name of the target device, the IP address of the target device, the user ID, and the IP address of the user device; and causing, by the computing device, execution of a logging application within the DMZ log server, the logging application recording one or more inputs or one or more outputs associated with the user device. - View Dependent Claims (8, 9, 10)
-
-
11. A system comprising:
-
a demilitarized (DMZ) log server to; receive, from an Internet program manager (IPM) server, an identification (ID) of a user associated with a user device and an Internet protocol (IP) address of the user device, connect the device to the user device based on the user ID and the IP address of the user device, receive, from the IPM server, a request to execute a logging application that records one or more inputs or one or more outputs associated with the user device and to connect the user device to a target device, connect the user device to the target device based on the request, an IP address of the target device, the user ID, and the IP address of the user device, execute the logging application based on the request, receive, via the logging application, the one or more inputs or the one or more outputs, and record the one or more inputs or the one or more outputs. - View Dependent Claims (12, 13, 14, 15, 16, 17)
-
-
18. A system comprising:
a particular server to; receive login information from a user device, determine, based on the login information, a user identification (ID) of a user of the user device and an Internet protocol (IP) address of the user device, receive, from the user device, a name and an IP address of a target device to be connected to the user device, and provide, to a demilitarized (DMZ) log server and based on the name of the target device, the IP address of the target device, the user ID, and the IP address of the user device, a request to execute a logging application that records one or more inputs or one or more outputs associated with the user device and to connect the user device to the target device. - View Dependent Claims (19, 20, 21)
Specification