Remote access method
First Claim
1. A remote access method in which an operational computer on an intranet accesses a target computer on the same or on another intranet via a relay management server on the Internet, comprising:
- a step in which each user carries an external storage medium having unique identification information different from each other;
a step in which the target computer transmits authentication information on each user to the relay management server to establish a connection;
a step in which at least a portion of a program for connecting the operational computer and the relay management server is stored in advance in the external storage medium;
a step in which the external storage medium having the unique identification information is connected to the operational computer;
a step in which the operational computer processes the unique identification information to generate special authentication information for the relay management server to perform authentication;
a step in which the user inputs authentication information for authentication of the user from the operational computer;
a step in which the operational computer transmits authentication information and the special authentication information for authentication of the user to the relay management server at the same time; and
a step in which the relay management server permits connection to the operational computer by one time of authentication when the both of the authentication information and the special authentication information for authentication of the user are transmitted from the operational computer;
wherein, the relay management server is not on the intranet of the operational computer or on the Intranet of the target computer, and operational computers in more than two intranets can access the relay management server and the relay management server can access target computers in more than two Intranets; and
wherein, the relay management server transmits image information on the target computer to the operational computer without taking out a file recorded in the target computer and transmits keyboard information or pointing information from the operational computer to the target computer without taking out a file recorded in the operational computer.
1 Assignment
0 Petitions
Accused Products
Abstract
All operations available on an intranet are securely performed from an outside of the intranet without taking out a file on the intranet from the intranet. A file on the intranet is not taken out, but, instead of this, image information on a target computer 1 is transmitted to an operational computer 4 with the http protocol, the https protocol, or the SSL protocol, and keyboard information, pointing information, or the like are transmitted from an operational computer 4 to the target computer 1. Consequently, the target computer 1 is operated.
41 Citations
14 Claims
-
1. A remote access method in which an operational computer on an intranet accesses a target computer on the same or on another intranet via a relay management server on the Internet, comprising:
-
a step in which each user carries an external storage medium having unique identification information different from each other; a step in which the target computer transmits authentication information on each user to the relay management server to establish a connection; a step in which at least a portion of a program for connecting the operational computer and the relay management server is stored in advance in the external storage medium; a step in which the external storage medium having the unique identification information is connected to the operational computer; a step in which the operational computer processes the unique identification information to generate special authentication information for the relay management server to perform authentication; a step in which the user inputs authentication information for authentication of the user from the operational computer; a step in which the operational computer transmits authentication information and the special authentication information for authentication of the user to the relay management server at the same time; and a step in which the relay management server permits connection to the operational computer by one time of authentication when the both of the authentication information and the special authentication information for authentication of the user are transmitted from the operational computer; wherein, the relay management server is not on the intranet of the operational computer or on the Intranet of the target computer, and operational computers in more than two intranets can access the relay management server and the relay management server can access target computers in more than two Intranets; and wherein, the relay management server transmits image information on the target computer to the operational computer without taking out a file recorded in the target computer and transmits keyboard information or pointing information from the operational computer to the target computer without taking out a file recorded in the operational computer. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A remote access method in which an operational computer on an intranet accesses a target computer on the same or on another intranet via a relay management server on the Internet, comprising:
-
a step in which each user carries an external storage medium having unique identification information different from each other; a step in which the target computer transmits authentication information on each user to the relay management server to establish a connection; a step in which at least a portion of a program for connecting the operational computer and the relay management server is stored in advance in the external storage medium; a step in which the external storage medium having the unique identification information is connected to the operational computer; a step in which the operational computer processes the unique identification information to generate special authentication information for the relay management server to perform authentication; a step in which the user inputs authentication information for authentication of the user from the operational computer; a step in which the operational computer transmits authentication information and the special authentication information for authentication of the user to the relay management server at the same time; and a step in which the relay management server permits connection to the operational computer by one time of authentication when the both of the authentication information and the special authentication information for authentication of the user are transmitted from the operational computer; wherein, the relay management server is not on the intranet of the operational computer or on the Intranet of the target computer, and operational computers in more than two intranets can access the relay management server and the relay management server can access target computers in more than two Intranets; and wherein, if the one time of authentication is achieved, the target computer transmits only information for reproducing a desktop output of the target computer to the operational computer via the relay management server. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
Specification