Access control center auto launch
First Claim
1. A system for controlling access by technical support personnel to a company'"'"'s computing device, the system comprising:
- a thin client configured to send identification information from the technical support personnel, the technical support personnel and the thin client being located in an access control center (ACC) that is physically and logically isolated from the company'"'"'s computing device;
a proxy server configured to receive communications from the thin client and forward the communications to an ACC server;
the ACC server configured to;
authorize the technical support personnel to request a first approval from an authentication server after the ACC server receives the identification information from the proxy server;
request the first approval from the authentication server;
obtain the first approval from the authentication server for the technical support personnel, the first approval authorizing the technical support personnel to request a second approval from the authentication server and to access a virtual desktop wherein the virtual desktop functions as a workstation device;
connect the thin client to the virtual desktop in a first session;
obtain the second approval from the authentication server for the technical support personnel after obtaining the first approval, the second approval authorizing the technical support personnel to access the company'"'"'s computing device;
the virtual desktop configured to automatically establish a remote access session for the technical support personnel from the virtual desktop to the company'"'"'s computing device after obtaining the second approval wherein the virtual desktop is provided by a virtual desktop manager that provides a number of virtual desktops to a number of technical support personnel; and
the company'"'"'s computing device.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods and systems provide indirect and temporary access to a company'"'"'s IT infrastructure and business applications. The methods/systems involve establishing an access control center (ACC) to control the access that technical support personnel may have to the company'"'"'s IT infrastructure and business applications. Thin client terminals with limited functionality may then be set up in the ACC for use by the technical support personnel. The thin client terminals connect the technical support personnel to workstations outside the ACC that operate as virtual desktops. The virtual desktops in turn connect the technical support personnel to the IT infrastructure and business applications. An ACC application may be used to automatically establish the connection between the thin client terminals and the virtual desktops and the virtual desktops and the IT infrastructure and business applications.
-
Citations
21 Claims
-
1. A system for controlling access by technical support personnel to a company'"'"'s computing device, the system comprising:
-
a thin client configured to send identification information from the technical support personnel, the technical support personnel and the thin client being located in an access control center (ACC) that is physically and logically isolated from the company'"'"'s computing device; a proxy server configured to receive communications from the thin client and forward the communications to an ACC server; the ACC server configured to; authorize the technical support personnel to request a first approval from an authentication server after the ACC server receives the identification information from the proxy server; request the first approval from the authentication server; obtain the first approval from the authentication server for the technical support personnel, the first approval authorizing the technical support personnel to request a second approval from the authentication server and to access a virtual desktop wherein the virtual desktop functions as a workstation device; connect the thin client to the virtual desktop in a first session; obtain the second approval from the authentication server for the technical support personnel after obtaining the first approval, the second approval authorizing the technical support personnel to access the company'"'"'s computing device; the virtual desktop configured to automatically establish a remote access session for the technical support personnel from the virtual desktop to the company'"'"'s computing device after obtaining the second approval wherein the virtual desktop is provided by a virtual desktop manager that provides a number of virtual desktops to a number of technical support personnel; and
the company'"'"'s computing device. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method of controlling access by technical support personnel to a company'"'"'s computing device, the method comprising:
-
receiving identification information from the technical support personnel via a thin client at a proxy server, the technical support personnel and the thin client being located in an access control center (ACC) that is physically and logically isolated from the company'"'"'s computing device; authorizing the technical support personnel to request a first approval from an authentication server after an ACC server receives the identification information from the proxy server; request the first approval from the authentication server; obtaining the first approval from the authentication server for the technical support personnel, the first approval authorizing the technical support personnel to request a second approval from the authentication server and to access a virtual desktop wherein the virtual desktop functions as a workstation device; connecting the thin client to the virtual desktop in a first session wherein the virtual desktop is provided by a virtual desktop manager that provides a number of virtual desktops to a number of technical support personnel; obtaining the second approval from the authentication server for the technical support personnel after obtaining the first approval, the second approval authorizing the technical support personnel to access the company'"'"'s computing device; and automatically establishing a remote access session for the technical support personnel from the virtual desktop to the company'"'"'s computing device after obtaining the second approval. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer-readable medium encoded with computer-readable instructions for controlling access by technical support personnel to a company'"'"'s computing device, the computer-readable instructions comprising instructions for causing a computer to:
-
receive identification information from the technical support personnel via the thin client at a proxy, the technical support personnel and the thin client being located in an access control center (ACC) that is physically and logically isolated from the company'"'"'s computing device; authorize the technical support personnel to request a first approval from an authentication server after an ACC server receives the identification information from the proxy server; request the first approval from the authentication server; obtain the first approval from the authentication server for the technical support personnel, the first approval authorizing the technical support personnel to request a second approval from the authentication server and to access a virtual desktop wherein the virtual desktop functions as a workstation device; connecting the thin client to the virtual desktop in a first session wherein the virtual desktop is provided by a virtual desktop manager that provides a number of virtual desktops to a number of technical support personnel; obtain the second approval from the authentication server for the technical support personnel after obtaining the first approval, the second approval authorizing the technical support personnel to access the company'"'"'s computing device; and automatically establish a remote access session for the technical support personnel from the virtual desktop to the company'"'"'s computing device after obtaining the second approval. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
Specification