WO2002084970A2 - System enabling remote access of a computing system - Google Patents

System enabling remote access of a computing system Download PDF

Info

Publication number
WO2002084970A2
WO2002084970A2 PCT/CA2002/000471 CA0200471W WO02084970A2 WO 2002084970 A2 WO2002084970 A2 WO 2002084970A2 CA 0200471 W CA0200471 W CA 0200471W WO 02084970 A2 WO02084970 A2 WO 02084970A2
Authority
WO
WIPO (PCT)
Prior art keywords
computing system
local computing
remote
computing device
central
Prior art date
Application number
PCT/CA2002/000471
Other languages
French (fr)
Other versions
WO2002084970A3 (en
Inventor
Saurabh Abhyankar
Original Assignee
Kronofusion.Com Technologies Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Kronofusion.Com Technologies Inc. filed Critical Kronofusion.Com Technologies Inc.
Priority to AU2002249029A priority Critical patent/AU2002249029A1/en
Publication of WO2002084970A2 publication Critical patent/WO2002084970A2/en
Publication of WO2002084970A3 publication Critical patent/WO2002084970A3/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/08Protocols specially adapted for terminal emulation, e.g. Telnet
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/30Definitions, standards or architectural aspects of layered protocol stacks
    • H04L69/32Architecture of open systems interconnection [OSI] 7-layer type protocol stacks, e.g. the interfaces between the data link level and the physical level
    • H04L69/322Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions
    • H04L69/329Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions in the application layer [OSI layer 7]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W92/00Interfaces specially adapted for wireless communication networks
    • H04W92/02Inter-networking arrangements

Definitions

  • the present invention pertains to the field of electronic communication systems, and more particularly, to a system and method for enabling access to the functionality of one computing system by one or more remotely located computing devices.
  • a remote computer such as mobile laptop computers
  • a user of a remote computer may use a public switched telephone network (PSTN) to establish a modem- based data link between the remote computer and an access server attached to the corporate network, with this access server providing communication with the desired local computer.
  • PSTN public switched telephone network
  • the user of a remote device can establish a PSTN connection to an access point of a public wide area network, such as the Internet, proceeding to communicate with the desired local computer through this wide area network.
  • a further system and method enabling a remote device to connect with a local computing device is described in U.S. Patent No. 5,892,432.
  • the method of creating a connection between a remote device and the base computing device commences with the remote device requesting communications with the base computing device using a wireless paging service.
  • the remote device generates a paging message that is transmitted by the wireless paging service and received by the control and activation device.
  • the control and activation device processes and interprets the paging message in order to activate the local computer.
  • the paging message includes a call-back number that is transferred from the control and activation device to the local computer.
  • the local computer dials the call-back number in order to establish a communication link with the remote device.
  • the local computer relinquishes control of the communication link to the remote device such that the information exchange can be initiated between the local computer and the remote device.
  • This technique of remote access requires an application program to be present on both the remote device and the local computing device in order to establish a communication link between said devices, thus the remote device requires minimum system requirements in order to implement this method.
  • European Patent Application No. 0972416 describes a system enabling a user wireless remote access to a variety of software functionalities residing within a local computer.
  • the remote device (user) generates control commands, which are wirelessly transmitted to a fixed radio part, which is directly connected to the local computer.
  • the fixed radio part processes the control commands and provides said commands to the local computer via a high speed serial bus.
  • An interface associated with the computer is responsive to the control commands and provides the remote • device access to the variety of software functionalities in response to the commands that have been transmitted.
  • This method of remote access of a computing device requires the direct connection of the remote device to the desired computing device. This connection is provided using a wireless link between the remote device and a radio fixed port which is in turn directly connected to the computing device in question.
  • Each of these remote access systems and methods require a direct communication link between the remote device and the local computing device and/or application software to be installed on the remote device in order to enable the remote device to access the functionalities of the local computing device.
  • This type of link may be difficult to create.
  • One reason for this could be the existence of a firewall that could prevent the connection.
  • Most standard firewalls would prevent such connections by default and, additionally, reconfiguration of the firewall to support such a remote connection would often require advanced skills on behalf of the user.
  • Another factor that could make this link difficult is the presence of a Dynamic Host Configuration Protocol (DHCP) server that dynamically allocates an IP address to the local computer on a periodic basis thus resulting in a change in the IP address of the local computer.
  • DHCP Dynamic Host Configuration Protocol
  • DHCP is an Internet protocol for automating the configuration of computers that use Transmission Control Protocol/Internet Protocol (TCP/IP).
  • TCP/IP is the method by which data on the Internet is divided into packets of bytes. Each packet is delimited with header information that includes the destination address where the packet is to be routed when it is transmitted over the Internet.
  • DHCP can be used to automatically assign IP addresses, to deliver TCP/IP stack configuration parameters such as the subnet mask and default router, and to provide other configuration information such as the addresses for printer, time and news servers.
  • DHCP is based on a client-server paradigm, in which the DHCP client, e.g. a desktop computer, contacts a DHCP server for configuration parameters.
  • the DHCP server is typically centrally located and operated by the network administrator.
  • the most important configuration parameter carried by DHCP is the IP address.
  • a computer must be initially assigned a specific IP address that is appropriate to the network to which the computer is attached, and that is not assigned to any other computer on that network. If a computer moves to a new network, it must be assigned a new IP address for that new network.
  • DHCP can be used to manage these assignments automatically. However, since DHCP causes the IP address of the local computer to change, it becomes difficult for the user to determine the IP address assigned to their local computer.
  • U.S. Patent No. 6,154,843 provides a secure remote access computing system for executing tasks on a secure private network requested by an unsecured remote computing device connected to the secure private network by way of a public communication network, without exposing any device in the secure private network other than a designated network interface device to the public communication network.
  • the network interface device dynamically generates a custom program containing the necessary network data and user interfaces and verifies the security privileges for the remote computing device, so that a remote user can define the task being executed on the private network by way of the secure network interface device surrogate.
  • a network interface device surrogate is required to be installed on each private network site which requires the capability to enable a remote computing device to access a particular computer connected to one of said private networks.
  • An object of the present invention is to provide a system enabling remote access of a computing system.
  • a system enabling a remote computing device to access the functionality of a local computing system using a public communication network, said system comprising: at least one remote computing device capable of accessing the public communication network; a central computing system having a central communications administrator installed thereon, said central computing system being capable of accessing the public communication network and a second communication network, said central communications administrator establishing a communication link between a remote computing device and a selected local computing system using said public communication network and said second communication network; at least one local computing system, each said local computing system having a unit communications manager installed thereon, said at least one local computing system being capable of accessing the second communication network, each unit communications manager maintaining communication between the central computing system and a local computing system enabling a remote computing device access to a selected local computing system thereby enabling a remote computing device to request a task be performed by the selected local computing system.
  • a method for a user of a remote computing device to access the functionality of a local computing system comprising the steps of: establishing a communication link between a remote computing device and a central communications administrator installed on a central computing system; authorising access to the central communications administrator by the user of the remote computing device; establishing a communication link between the remote computing device and a unit communications manager installed on a local computing system; authorising access to the unit communications manager by the user of the remote computing device; identifying a task to be executed by the local computing system; executing the identified task by the local computing system; and terminating the communication link between the remote computing device and the local computing system.
  • a computer program product for enabling a remote computing device to access the functionality of a local computing system
  • said computer program product comprising a computer readable storage medium including a first program and a second program, said first program including a set of instructions for: establishing a connection between a remote computing device and a local computing system through a central computing system; authorising a user to access the central computing system; and updating a list ; associating locations with particular local computing systems, thereby enabling contact of a particular local computing device by the central computing system; and said second program including a set of instructions for: translating information transmitted between a remote computing device and a local computing system; authorising a user to access a particular local computing system; and contacting, periodically, the central computing system, thereby updating a location with which the particular local computing system is associated.
  • Figure 1 illustrates a remote access system according to one embodiment of the present invention.
  • Figure 2 illustrates an overview of the operational steps for establishing remote access of local computing system by a remote computing device according to one embodiment of the present invention.
  • remote computing device is used to describe a device (e.g. cellular phone, PDA, PC) from which a director will access a local computing system within the network.
  • a device e.g. cellular phone, PDA, PC
  • directory is used to describe an individual, computer or other initiator of information transfer within the network, operating by way of a remote computing device.
  • the term "local computing system” is used to describe a computer that will be remotely accessed by a director through the Unit Communications Manager (UCM) installed on that system.
  • UCM Unit Communications Manager
  • One typical example of such a computing system is a personal computer (PC).
  • CCA Central Communications Administrator
  • UCM Unit Communications Manager
  • the term "Unit Communications Manager” is used to describe a system that is installed on each local computing system which is a member of the network of the invention.
  • the UCM manages a number of functions resulting in the safe, secure, authorized transfer of information within the network.
  • central computing system is used to describe a system of one or more computers that facilitate the communication between a local computing system and a remote computing device.
  • the "Central Communications Administrator” (CCA) is installed on the central computing system.
  • authorization code is used to describe a code that enables a local computing system to connect to the central computing system.
  • An authorization code for each local computing system associated with the network is stored on the database of the CCA.
  • the CCA uses an authorization code to authenticate the identity and authority of a local computing system thereby allowing an authorized local computing system to connect to the CCA and hence the network.
  • directory password means the personal password of a director, that is recognized by the UCM only, and used to authenticate the identity and authority of a director to use a specific local computing system, wherein the director password is stored in a secure manner on a specific local computing system.
  • This invention provides a system enabling the remote access of a computing system's functionality.
  • the network is generated by two primary systems: a Central Communications Administrator (CCA) which is installed on a central computing system and a Unit Communications Manager (UCM) which is installed on each local computing system (e.g. a personal computer).
  • CCA Central Communications Administrator
  • UCM Unit Communications Manager
  • Each UCM which is on-line, communicates with the CCA for authentication.
  • a network is generated that can be accessed by a director using a remote computing device and used to transmit tasks to be executed by the specific local computing system to which it is connected, such as the transfer of information from one computing system to another destination.
  • the remote access system can be configured as illustrated in Figure 1.
  • a director using a remote computing device 20 sends a request for remote access over a first communication network 50 to the central computing system 10.
  • the first communication network 50 can be a public communication network, for example the Internet or other network with similar communication characteristics.
  • the central computing system 10 includes the Central Communications Administrator (CCA) which facilitates the remote access connection between the remote computing device 20 and a local computing system 30.
  • Each local computing system 30 comprises a Unit Communications Manager (UCM) which manages the communication link established between a local computing system 30 and the central computing system 10 using the second communication network 60.
  • UCM Unit Communications Manager
  • the CCA operating on the central computing system 10 contacts the UCM on the selected local computing system 30 using the second communication network 60 and subsequently establishes a connection between the remote computing device 20 and the selected local computing system 30 whereby the CCA routes the information passed between the remote computing device 20 and the local computing system 30.
  • the second communication network 60 can be either a public communication network, for example the Internet or as an alternative the second communication network may be a private communication network for example a local area network (LAN).
  • the type of network acting as the second communication network can depend on, for example, the location of the central computing system or the operator of the central computing system, if the operator is for example a third party.
  • a director using the remote computing device 20 can request the particular local computing system 30 to execute desired tasks, for example information transfer or program execution.
  • Security verification exchanges may occur between the director of the remote device and the network prior to access to the CCA and/or the UCM in order to provide access protection through proper user identification procedures and possibly to limit the access to information within the local computing system.
  • the director of the remote computing device is able to instruct the local computing system to perform a number of tasks such as information exchange and application execution.
  • the local computing system, the central computing system and the remote computing device may record and store an activity log file to document the exchanges that occurred during the communication exchange.
  • the network can be accessed by a director using a remote computing device that is capable of communicating with the central computing system using means such as an on-board web-browser, WAP compatible capabilities, or digital signal communication means.
  • a director can initiate communication with a CCA and establish a connection with a local computing system.
  • the director is presented with a list of possible local computing systems'to which connection is permitted.
  • the director chooses a local computing system for which the CCA will establish a connection with the UCM managing that particular local computing system.
  • the UCM will verify the identity and authority of the director to log-on to the local computing system, after which the director will be allowed to enter into the local computing system and initiate the execution of tasks which may be performed by that local computing system.
  • the director can cause information to be sent to the remote computing device, sent to other unique computing systems, or some other destination.
  • the information is rendered secure prior to transfer by some means known in the art such as encryption.
  • the Central Communications Administrator is a system that is installed on the central computing system, the primary function of which is to provide a means for establishing a communications link between the remote computing device and a local computing system.
  • a further function of the CCA is to establish authentication of the users of the network and to provide a means for administering access to a plurality of local computing systems by a particular director.
  • the CCA also functions to authenticate local computing systems on the network through communication between the CCA and the UCM.
  • the authorization and administration of the network is provided by a collection of tables correlating the relevant information comprising director identification, authorization codes, the identity of the local computing systems which may be accessed, and the electronic addresses of the local computing systems.
  • the CCA maintains a table correlating the identity of each local computing system, which is actively connected to the network with the most current electronic addresses of each local computing system and any other information which may be considered necessary.
  • This table provides a means for the CCA to locate the local computing system to which connection is requested by a director of a remote computing device.
  • the CCA further contains a table correlating the identity associated with a director of a remote computing device with the identification of the local computing systems to which this director is permitted access.
  • the CCA maintains a database enabling the administration of the plurality of members of the network, said plurality not being limited to the members connected to the network at any given point in time.
  • This database contains information regarding each member of the network, with said information comprising user names, authorization codes, personal information of each of the users, the identification of all of the local computing systems and any other information which may be considered necessary.
  • This database is constantly updated, thus providing a means for the addition and deletion of members of the network.
  • the tables mentioned above are maintained in an encrypted format thereby possible increasing the confidentially of the information they contain.
  • the CCA further provides a means for the creation of a communication link between the remote computing device and a local computing system, upon identification of the director and subsequent selection of the specific local computing system.
  • the server based CCA merely manages a database of network users and provides a communication channel between the remote device and the UCM's, the risk of damage by unauthorized users may be diminished. Such entry may only reveal the database controls and the ability to perhaps watch the transfer of (possibly encrypted) information between the remote computing device and the local computing system. The unauthorized user should not be able to gain access to the protected information on the local computing system.
  • the central communications administrator can be software, hardware or a combination thereof. A worker skilled in the art of computer technology would understand how to construct a central communications administrator using one of these formats.
  • the Unit Communications Manager is a system that is installed on each local computing system, which is a member of the network of this invention.
  • the primary task of the UCM is to provide a means for access to a local computing system by directors using remote computing devices which are connected to the central computing system.
  • the UCM provides this ability by maintaining communications between the local computing system and the CCA on the central computing system thus enabling remote access to the local computing system by authorized directors connected to the central computing system.
  • An additional task of the UCM is to provide a means for requested tasks to be performed and to transmit the results of these tasks to the director of the remote computing device by way of the central computing system. In cases where the generated response requires translation into a format compatible with the platform of the remote computing device, said translation can be undertaken either by the UCM on the local computing system or by the CCA on the central computing system.
  • the Unit Communications Manager can comprise one or more modules which provide information relating to the creation of interfaces with the variety of remote computing devices and/or the preferred format of an interface.
  • a particular module can define the parameters for the creation of an interface with a cellular phone and a further module can define the interface for a PDA or other remote computing device.
  • the UCM can also comprise one or more modules which provide access to applications and data on the local computing system.
  • a module may enable access to the data and capabilities of OutlookTM or some other application.
  • the UCM further contacts the CCA, at predetermined intervals, indicating the electronic address of the local computing system upon which it is installed, thus providing a means for the CCA to contact the desired UCM upon request from a director of a remote computing device.
  • this procedure enables the CCA to contact a local computing device that is protected by a firewall or whose IP address is dynamically allocated using DHCP.
  • a further task of the UCM is to establish if a particular director is authorized to access the local computing system on which the UCM is installed. This authorization is enabled by the use of the director's password, which is only recognized by the UCM in question. Upon verification of said password the director is capable of accessing the full functionality of the local computing system.
  • the information, which is being transferred will be in an encrypted form.
  • SSL Secure Socket Layer
  • a Secure Socket Layer (SSL) encryption technique can be used to code the information.
  • SSL works by creating a temporary shared "master key" that lets only the computers on either end of a transmission scramble and unscramble information.
  • This encryption technique involves the creation of a master key that is used to encode and decode transmissions. For example, most master keys range from 40 to 1,024 digits long. As the number of digits in the key gets longer, the number of possible combinations increases. Therefore, the longer the key is the more secure, the transmission. However the longer the master key becomes, the computing power required for encryption and decryption increases.
  • the unit communications manager can be software, hardware or a combination thereof. A worker skilled in the art of computer technology would understand how to construct a unit communications manager using one of these formats.
  • the CCA installed on a central computing system 10, receives a request from a director using a remote computing device 30.
  • the CCA 10 requests identification information such as the director's username and uses that information to provide the director with a list of local computing systems 20 that are currently on-line, and to which that director is permitted access.
  • the director chooses a local computing system 20 and the CCA establishes contact between the director and the UCM of the selected local computing system 20 wherein the CCA routes the information transferred between the remote computing device 30 and the UCM of the selected local computing system 20.
  • the UCM requests identifying information such as the director's username and the director's password and uses that information to verify the identity and authority of the director to enter and use that local computing system 20. Once authenticated, the director accesses the local computing system 20 and directs the tasks to be performed.
  • the tasks performed upon creation of the interconnection between the remote computing device and the local computing system are related to information transfer.
  • the sequence of operational steps executed in order to enable remote access of a local computing system by a remote computing device is illustrated in Figure 2.
  • the operational steps establishing the interaction between a remote computing device, the central computing system and a local computing system is enabled by the Central Communications Administrator (CCA) and the Unit Communications Manager (UCM).
  • CCA Central Communications Administrator
  • UCM Unit Communications Manager
  • Step 110 a director locates a remote computing device (Step 110), which can be a cellular phone, personal digital assistant (PDA) or a personal computer for example, or any other device which is capable of communication on a public communication network, like the Internet, for example.
  • a remote computing device can be a cellular phone, personal digital assistant (PDA) or a personal computer for example, or any other device which is capable of communication on a public communication network, like the Internet, for example.
  • Step 120 Communication between the remote computing device and the Central Communication Administrator (CCA) is subsequently established (Step 120).
  • This communication can be performed over a public coirimunication network, for example the Internet.
  • the director transmits identification information to the CCA (Step 130), in order to establish the identity of the director on the network.
  • the director may be required to transmit additional identification information to the CCA for authorization.
  • This additional authorization can be performed in a number of different manners for example a password or biometric scan or any other security protocol as would be known to a worker skilled in the art.
  • the CCA Upon identification or authorization of the director, the CCA generates a list of local computing systems which can be accessed by the director and which are network active (Step 140).
  • a local computing device is network active if it has been actively updating its virtual location on the network, which can be established using an IP address, for example, and has been authorized to access the network by the CCA. From this list of potential local computing systems the director selects the local computing system with which remote access is required (Step 150).
  • the CCA establishes a communication link between the remote computing device and the Unit Communications Manager (UCM) of the desired local computing system (Step 160) via the CCA of the central computing system.
  • the UCM of the selected local computing system requests authentication of the director (Step 170) in the form of a password or other identification means as would be known to a worker skilled in the art, prior to the director being provided with access to the functionality of the selected local computing system. In this manner, authorization is required prior to granting a director access to a particular local computing system.
  • a user of a particular local computing system may wish to provide remote access to the particular local computing system by a number of directors without the requirement of prior authorization.
  • the user may configure the UCM to provide access to certain (or all) capabilities of the particular local computing system without authorization.
  • the UCM subsequently generates an appropriate interface for the transmission of information to the remote computing device (Step 180).
  • This interface is dependent on the operating system of the remote computing device or the required display format to be used for the information, for example.
  • the CCA generates an appropriate interface for the transmission of information to the remote computing device (Step 180).
  • the UCM transmits the required specifications of the appropriate interface of the remote computing device to the CCA using the established communication link between the UCM of the selected local computing system and the CCA of the central computing system.
  • Step 190 the director identifies the task which is to be performed by the specific local computing system, using the remote computing device and these instructions are subsequently transmitted to the UCM of the specific local computing device.
  • the UCM proceeds to execute the desired instructions (Step 200) on the specific computing device. These instructions may entail the transmission of information from one site to another or the execution of a particular program, for example.
  • the UCM proceeds to send information to the remote computing device (Step 210) by way of the central computing system, wherein this information may be a confirmation of the execution of the task or the results of the task, for example.
  • said translation can be undertaken either by the UCM on the local computing system or by the CCA on the central computing system.
  • the remote computing device subsequently disconnects the link between itself and the specific local computing system (Step 220).
  • the communication between a remote computing device and a local computing system can be performed without the interruption of the tasks being performed by the local computing system being accessed.
  • multiple remote computing devices can access the same local computing system at the same time, thereby producing a "many to one" relationship between the remote computing devices and a specific local computing system.

Abstract

There is provided a system enabling the remote access of a computing system's functionality. The network is generated by two primary systems: a Central Communications Administrator (CCA) which is installed on a central computing system and a Unit Communications Manager (UCM) which is installed on each local computing system (e.g. a personal computer). Each UCM which is on-line, communicates with the CCA to generate a network that can be accessed by a director using a remote computing device and used to transmit tasks to be executed by the specific local computing system to which it is connected, such as the transfer of information from one computing system to another destination.

Description

SYSTEM ENABLING REMOTE ACCESS OF A COMPUTING SYSTEM
FIELD OF THE INVENTION
The present invention pertains to the field of electronic communication systems, and more particularly, to a system and method for enabling access to the functionality of one computing system by one or more remotely located computing devices.
BACKGROUND
The ability to access information from all over the globe is essential to the functionality of the modern world. Users of remote computers, such as mobile laptop computers, can often access computers permanently connected to a local corporate network (e.g. a local computer) using a variety of communication paths. For instance, a user of a remote computer may use a public switched telephone network (PSTN) to establish a modem- based data link between the remote computer and an access server attached to the corporate network, with this access server providing communication with the desired local computer. Alternatively, the user of a remote device can establish a PSTN connection to an access point of a public wide area network, such as the Internet, proceeding to communicate with the desired local computer through this wide area network. These types of connections, while providing a communication link between the remote computer and the local computer, do not provide the remote computer with access to the functionality of the local computer.
There are methods for accessing and controlling local computers using a remote computer, with certain methods for accomplishing these remote communication sessions requiring special application software to be installed on both the host computer and the remote computer. PC Anywhere.RTM™ and Laplink.RTM™. are two examples of such commercially available remote control software programs. These types of remote control software are capable of delivering keystrokes to a host computer via modem-to-modem connections, network connections or serial port connections. However, for a successful link to occur, a computer at the remote end is required to run the remote control software and transmit and receive data signals. This technique enables a remote user to access the full functionality of a local computer however, since the remote device must be capable of running the connection software, particular system requirements for the remote device are necessary including compatibility between the computing platforms of the remote device and the local computing device.
A further system and method enabling a remote device to connect with a local computing device is described in U.S. Patent No. 5,892,432. The method of creating a connection between a remote device and the base computing device commences with the remote device requesting communications with the base computing device using a wireless paging service. The remote device generates a paging message that is transmitted by the wireless paging service and received by the control and activation device. The control and activation device processes and interprets the paging message in order to activate the local computer. The paging message includes a call-back number that is transferred from the control and activation device to the local computer. The local computer dials the call-back number in order to establish a communication link with the remote device. After identification and verification, the local computer relinquishes control of the communication link to the remote device such that the information exchange can be initiated between the local computer and the remote device. This technique of remote access requires an application program to be present on both the remote device and the local computing device in order to establish a communication link between said devices, thus the remote device requires minimum system requirements in order to implement this method.
Furthermore, European Patent Application No. 0972416 describes a system enabling a user wireless remote access to a variety of software functionalities residing within a local computer. The remote device (user) generates control commands, which are wirelessly transmitted to a fixed radio part, which is directly connected to the local computer. The fixed radio part processes the control commands and provides said commands to the local computer via a high speed serial bus. An interface associated with the computer is responsive to the control commands and provides the remote • device access to the variety of software functionalities in response to the commands that have been transmitted. This method of remote access of a computing device requires the direct connection of the remote device to the desired computing device. This connection is provided using a wireless link between the remote device and a radio fixed port which is in turn directly connected to the computing device in question.
Each of these remote access systems and methods require a direct communication link between the remote device and the local computing device and/or application software to be installed on the remote device in order to enable the remote device to access the functionalities of the local computing device. This type of link may be difficult to create. One reason for this could be the existence of a firewall that could prevent the connection. Most standard firewalls would prevent such connections by default and, additionally, reconfiguration of the firewall to support such a remote connection would often require advanced skills on behalf of the user. Another factor that could make this link difficult is the presence of a Dynamic Host Configuration Protocol (DHCP) server that dynamically allocates an IP address to the local computer on a periodic basis thus resulting in a change in the IP address of the local computer.
DHCP is an Internet protocol for automating the configuration of computers that use Transmission Control Protocol/Internet Protocol (TCP/IP). TCP/IP is the method by which data on the Internet is divided into packets of bytes. Each packet is delimited with header information that includes the destination address where the packet is to be routed when it is transmitted over the Internet.
DHCP can be used to automatically assign IP addresses, to deliver TCP/IP stack configuration parameters such as the subnet mask and default router, and to provide other configuration information such as the addresses for printer, time and news servers. DHCP is based on a client-server paradigm, in which the DHCP client, e.g. a desktop computer, contacts a DHCP server for configuration parameters. The DHCP server is typically centrally located and operated by the network administrator. The most important configuration parameter carried by DHCP is the IP address. A computer must be initially assigned a specific IP address that is appropriate to the network to which the computer is attached, and that is not assigned to any other computer on that network. If a computer moves to a new network, it must be assigned a new IP address for that new network. DHCP can be used to manage these assignments automatically. However, since DHCP causes the IP address of the local computer to change, it becomes difficult for the user to determine the IP address assigned to their local computer.
U.S. Patent No. 6,154,843 provides a secure remote access computing system for executing tasks on a secure private network requested by an unsecured remote computing device connected to the secure private network by way of a public communication network, without exposing any device in the secure private network other than a designated network interface device to the public communication network. The network interface device dynamically generates a custom program containing the necessary network data and user interfaces and verifies the security privileges for the remote computing device, so that a remote user can define the task being executed on the private network by way of the secure network interface device surrogate. Using this type of remote access system a network interface device surrogate is required to be installed on each private network site which requires the capability to enable a remote computing device to access a particular computer connected to one of said private networks.
This background information is provided for the purpose of making known information believed by the applicant to be of possible relevance to the present invention. No admission is necessarily intended, nor should be construed, that any of the preceding information constitutes prior art against the present invention.
Due to the problems associated with direct-link remote access, there is a need for a system and method for providing a remote device access to the functionality of a local computing device without establishing a direct connection between said devices and said system not requiring an application program to be operating on the remote device. SUMMARY OF THE INVENTION
An object of the present invention is to provide a system enabling remote access of a computing system. In accordance with an aspect of the present invention, there is provided a system enabling a remote computing device to access the functionality of a local computing system using a public communication network, said system comprising: at least one remote computing device capable of accessing the public communication network; a central computing system having a central communications administrator installed thereon, said central computing system being capable of accessing the public communication network and a second communication network, said central communications administrator establishing a communication link between a remote computing device and a selected local computing system using said public communication network and said second communication network; at least one local computing system, each said local computing system having a unit communications manager installed thereon, said at least one local computing system being capable of accessing the second communication network, each unit communications manager maintaining communication between the central computing system and a local computing system enabling a remote computing device access to a selected local computing system thereby enabling a remote computing device to request a task be performed by the selected local computing system.
In accordance with another aspect of the invention, there is provided a method for a user of a remote computing device to access the functionality of a local computing system, said method comprising the steps of: establishing a communication link between a remote computing device and a central communications administrator installed on a central computing system; authorising access to the central communications administrator by the user of the remote computing device; establishing a communication link between the remote computing device and a unit communications manager installed on a local computing system; authorising access to the unit communications manager by the user of the remote computing device; identifying a task to be executed by the local computing system; executing the identified task by the local computing system; and terminating the communication link between the remote computing device and the local computing system.
In accordance with another aspect of the invention there is provided a computer program product for enabling a remote computing device to access the functionality of a local computing system, said computer program product comprising a computer readable storage medium including a first program and a second program, said first program including a set of instructions for: establishing a connection between a remote computing device and a local computing system through a central computing system; authorising a user to access the central computing system; and updating a list ; associating locations with particular local computing systems, thereby enabling contact of a particular local computing device by the central computing system; and said second program including a set of instructions for: translating information transmitted between a remote computing device and a local computing system; authorising a user to access a particular local computing system; and contacting, periodically, the central computing system, thereby updating a location with which the particular local computing system is associated.
BRIEF DESCRIPTION OF THE FIGURES
Figure 1 illustrates a remote access system according to one embodiment of the present invention.
Figure 2 illustrates an overview of the operational steps for establishing remote access of local computing system by a remote computing device according to one embodiment of the present invention. DETAILED DESCRIPTION OF THE INVENTION
Definitions
The term "remote computing device" is used to describe a device (e.g. cellular phone, PDA, PC) from which a director will access a local computing system within the network.
The term "director" is used to describe an individual, computer or other initiator of information transfer within the network, operating by way of a remote computing device.
The term "local computing system" is used to describe a computer that will be remotely accessed by a director through the Unit Communications Manager (UCM) installed on that system. One typical example of such a computing system is a personal computer (PC).
The term "Central Communications Administrator" (CCA) is used to describe a system that is installed on the central computing system that facilitates the remote-access connection between a "remote computing device" and a "local computing system".
The term "Unit Communications Manager" (UCM) is used to describe a system that is installed on each local computing system which is a member of the network of the invention. The UCM manages a number of functions resulting in the safe, secure, authorized transfer of information within the network.
The term "central computing system" is used to describe a system of one or more computers that facilitate the communication between a local computing system and a remote computing device. The "Central Communications Administrator" (CCA) is installed on the central computing system.
The term "authorization code" is used to describe a code that enables a local computing system to connect to the central computing system. An authorization code for each local computing system associated with the network is stored on the database of the CCA. The CCA uses an authorization code to authenticate the identity and authority of a local computing system thereby allowing an authorized local computing system to connect to the CCA and hence the network.
The term "director password" means the personal password of a director, that is recognized by the UCM only, and used to authenticate the identity and authority of a director to use a specific local computing system, wherein the director password is stored in a secure manner on a specific local computing system.
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs.
This invention provides a system enabling the remote access of a computing system's functionality. The network is generated by two primary systems: a Central Communications Administrator (CCA) which is installed on a central computing system and a Unit Communications Manager (UCM) which is installed on each local computing system (e.g. a personal computer). Each UCM which is on-line, communicates with the CCA for authentication. Once a UCM is authenticated by the CCA, a network is generated that can be accessed by a director using a remote computing device and used to transmit tasks to be executed by the specific local computing system to which it is connected, such as the transfer of information from one computing system to another destination.
In one embodiment the remote access system can be configured as illustrated in Figure 1. A director using a remote computing device 20 sends a request for remote access over a first communication network 50 to the central computing system 10. The first communication network 50 can be a public communication network, for example the Internet or other network with similar communication characteristics. The central computing system 10 includes the Central Communications Administrator (CCA) which facilitates the remote access connection between the remote computing device 20 and a local computing system 30. Each local computing system 30 comprises a Unit Communications Manager (UCM) which manages the communication link established between a local computing system 30 and the central computing system 10 using the second communication network 60. Upon selection of a particular local computing system 30, the CCA operating on the central computing system 10, contacts the UCM on the selected local computing system 30 using the second communication network 60 and subsequently establishes a connection between the remote computing device 20 and the selected local computing system 30 whereby the CCA routes the information passed between the remote computing device 20 and the local computing system 30. The second communication network 60 can be either a public communication network, for example the Internet or as an alternative the second communication network may be a private communication network for example a local area network (LAN). The type of network acting as the second communication network can depend on, for example, the location of the central computing system or the operator of the central computing system, if the operator is for example a third party. Upon establishing this connection, a director using the remote computing device 20 can request the particular local computing system 30 to execute desired tasks, for example information transfer or program execution.
The various protocols enabling the communication between a remote computing device, the central computing system and local computing devices using public or private communication networks which are hardwired or wireless would be readily understood and known by a worker skilled in the art of electronic communication protocol.
Security verification exchanges may occur between the director of the remote device and the network prior to access to the CCA and/or the UCM in order to provide access protection through proper user identification procedures and possibly to limit the access to information within the local computing system. Once communication between the local computing system and the remote computing device has been established (facilitated by the central computing system), the director of the remote computing device is able to instruct the local computing system to perform a number of tasks such as information exchange and application execution. The local computing system, the central computing system and the remote computing device may record and store an activity log file to document the exchanges that occurred during the communication exchange.
Once established, the network can be accessed by a director using a remote computing device that is capable of communicating with the central computing system using means such as an on-board web-browser, WAP compatible capabilities, or digital signal communication means. Using this network, a director can initiate communication with a CCA and establish a connection with a local computing system.
In one embodiment of the present invention the director is presented with a list of possible local computing systems'to which connection is permitted. The director chooses a local computing system for which the CCA will establish a connection with the UCM managing that particular local computing system. The UCM will verify the identity and authority of the director to log-on to the local computing system, after which the director will be allowed to enter into the local computing system and initiate the execution of tasks which may be performed by that local computing system. For example, the director can cause information to be sent to the remote computing device, sent to other unique computing systems, or some other destination. In one embodiment, the information is rendered secure prior to transfer by some means known in the art such as encryption.
Central Communications Administrator
The Central Communications Administrator is a system that is installed on the central computing system, the primary function of which is to provide a means for establishing a communications link between the remote computing device and a local computing system. A further function of the CCA is to establish authentication of the users of the network and to provide a means for administering access to a plurality of local computing systems by a particular director. The CCA also functions to authenticate local computing systems on the network through communication between the CCA and the UCM.
The authorization and administration of the network is provided by a collection of tables correlating the relevant information comprising director identification, authorization codes, the identity of the local computing systems which may be accessed, and the electronic addresses of the local computing systems.
At one administration level, the CCA maintains a table correlating the identity of each local computing system, which is actively connected to the network with the most current electronic addresses of each local computing system and any other information which may be considered necessary. This table provides a means for the CCA to locate the local computing system to which connection is requested by a director of a remote computing device. The CCA further contains a table correlating the identity associated with a director of a remote computing device with the identification of the local computing systems to which this director is permitted access.
At a further administration level, the CCA maintains a database enabling the administration of the plurality of members of the network, said plurality not being limited to the members connected to the network at any given point in time. This database contains information regarding each member of the network, with said information comprising user names, authorization codes, personal information of each of the users, the identification of all of the local computing systems and any other information which may be considered necessary. This database is constantly updated, thus providing a means for the addition and deletion of members of the network.
In one embodiment of the present invention, the tables mentioned above are maintained in an encrypted format thereby possible increasing the confidentially of the information they contain. The CCA further provides a means for the creation of a communication link between the remote computing device and a local computing system, upon identification of the director and subsequent selection of the specific local computing system.
Since the server based CCA merely manages a database of network users and provides a communication channel between the remote device and the UCM's, the risk of damage by unauthorized users may be diminished. Such entry may only reveal the database controls and the ability to perhaps watch the transfer of (possibly encrypted) information between the remote computing device and the local computing system. The unauthorized user should not be able to gain access to the protected information on the local computing system.
In one embodiment of the present invention, the central communications administrator can be software, hardware or a combination thereof. A worker skilled in the art of computer technology would understand how to construct a central communications administrator using one of these formats.
Unit Communications Manager
The Unit Communications Manager is a system that is installed on each local computing system, which is a member of the network of this invention. The primary task of the UCM is to provide a means for access to a local computing system by directors using remote computing devices which are connected to the central computing system. The UCM provides this ability by maintaining communications between the local computing system and the CCA on the central computing system thus enabling remote access to the local computing system by authorized directors connected to the central computing system. An additional task of the UCM is to provide a means for requested tasks to be performed and to transmit the results of these tasks to the director of the remote computing device by way of the central computing system. In cases where the generated response requires translation into a format compatible with the platform of the remote computing device, said translation can be undertaken either by the UCM on the local computing system or by the CCA on the central computing system.
In one embodiment of the present invention, the Unit Communications Manager can comprise one or more modules which provide information relating to the creation of interfaces with the variety of remote computing devices and/or the preferred format of an interface. For example a particular module can define the parameters for the creation of an interface with a cellular phone and a further module can define the interface for a PDA or other remote computing device. The UCM can also comprise one or more modules which provide access to applications and data on the local computing system. For example, a module may enable access to the data and capabilities of Outlook™ or some other application.
The UCM further contacts the CCA, at predetermined intervals, indicating the electronic address of the local computing system upon which it is installed, thus providing a means for the CCA to contact the desired UCM upon request from a director of a remote computing device. Typically, this procedure enables the CCA to contact a local computing device that is protected by a firewall or whose IP address is dynamically allocated using DHCP.
In one embodiment, a further task of the UCM is to establish if a particular director is authorized to access the local computing system on which the UCM is installed. This authorization is enabled by the use of the director's password, which is only recognized by the UCM in question. Upon verification of said password the director is capable of accessing the full functionality of the local computing system.
In one embodiment of the present invention, the information, which is being transferred will be in an encrypted form. There are a plurality of methods of encryption which may be incorporated into the present invention with suitable methods being known to a worker skilled in the art. For example, a Secure Socket Layer (SSL) encryption technique can be used to code the information. SSL works by creating a temporary shared "master key" that lets only the computers on either end of a transmission scramble and unscramble information. This encryption technique involves the creation of a master key that is used to encode and decode transmissions. For example, most master keys range from 40 to 1,024 digits long. As the number of digits in the key gets longer, the number of possible combinations increases. Therefore, the longer the key is the more secure, the transmission. However the longer the master key becomes, the computing power required for encryption and decryption increases.
In one embodiment of the present invention, the unit communications manager can be software, hardware or a combination thereof. A worker skilled in the art of computer technology would understand how to construct a unit communications manager using one of these formats.
With further reference to Figure 1, the primary components and the interaction between said components is described. The CCA, installed on a central computing system 10, receives a request from a director using a remote computing device 30. The CCA 10 requests identification information such as the director's username and uses that information to provide the director with a list of local computing systems 20 that are currently on-line, and to which that director is permitted access. The director chooses a local computing system 20 and the CCA establishes contact between the director and the UCM of the selected local computing system 20 wherein the CCA routes the information transferred between the remote computing device 30 and the UCM of the selected local computing system 20. The UCM requests identifying information such as the director's username and the director's password and uses that information to verify the identity and authority of the director to enter and use that local computing system 20. Once authenticated, the director accesses the local computing system 20 and directs the tasks to be performed.
In one embodiment the tasks performed upon creation of the interconnection between the remote computing device and the local computing system are related to information transfer. In one embodiment of the present invention, the sequence of operational steps executed in order to enable remote access of a local computing system by a remote computing device is illustrated in Figure 2. The operational steps establishing the interaction between a remote computing device, the central computing system and a local computing system is enabled by the Central Communications Administrator (CCA) and the Unit Communications Manager (UCM). The CCA is a system which is installed on the central computing system and the UCM is a system which is installed on each local computing system within the network. Initially a director locates a remote computing device (Step 110), which can be a cellular phone, personal digital assistant (PDA) or a personal computer for example, or any other device which is capable of communication on a public communication network, like the Internet, for example.
Communication between the remote computing device and the Central Communication Administrator (CCA) is subsequently established (Step 120). This communication can be performed over a public coirimunication network, for example the Internet. The director then transmits identification information to the CCA (Step 130), in order to establish the identity of the director on the network. In one embodiment, the director may be required to transmit additional identification information to the CCA for authorization. This additional authorization can be performed in a number of different manners for example a password or biometric scan or any other security protocol as would be known to a worker skilled in the art.
Upon identification or authorization of the director, the CCA generates a list of local computing systems which can be accessed by the director and which are network active (Step 140). A local computing device is network active if it has been actively updating its virtual location on the network, which can be established using an IP address, for example, and has been authorized to access the network by the CCA. From this list of potential local computing systems the director selects the local computing system with which remote access is required (Step 150).
The CCA establishes a communication link between the remote computing device and the Unit Communications Manager (UCM) of the desired local computing system (Step 160) via the CCA of the central computing system. The UCM of the selected local computing system requests authentication of the director (Step 170) in the form of a password or other identification means as would be known to a worker skilled in the art, prior to the director being provided with access to the functionality of the selected local computing system. In this manner, authorization is required prior to granting a director access to a particular local computing system.
In another embodiment of the invention, a user of a particular local computing system may wish to provide remote access to the particular local computing system by a number of directors without the requirement of prior authorization. In such cases, the user may configure the UCM to provide access to certain (or all) capabilities of the particular local computing system without authorization.
In one embodiment the UCM subsequently generates an appropriate interface for the transmission of information to the remote computing device (Step 180). This interface is dependent on the operating system of the remote computing device or the required display format to be used for the information, for example. Based on the variety of remote computing devices which may access the network, including cellular phones, PDAs and personal computers, for example, there are a plurality of formats and operating systems which can establish the required interface for the transmission of the information.
In an alternate embodiment the CCA generates an appropriate interface for the transmission of information to the remote computing device (Step 180). In this embodiment, the UCM transmits the required specifications of the appropriate interface of the remote computing device to the CCA using the established communication link between the UCM of the selected local computing system and the CCA of the central computing system.
During Step 190 the director identifies the task which is to be performed by the specific local computing system, using the remote computing device and these instructions are subsequently transmitted to the UCM of the specific local computing device. The UCM proceeds to execute the desired instructions (Step 200) on the specific computing device. These instructions may entail the transmission of information from one site to another or the execution of a particular program, for example. Upon the completion of the instructions requested by the director using the remote computing device, the UCM proceeds to send information to the remote computing device (Step 210) by way of the central computing system, wherein this information may be a confirmation of the execution of the task or the results of the task, for example. In cases where the generated response requires translation into a format compatible with the platform of the remote computing device, said translation can be undertaken either by the UCM on the local computing system or by the CCA on the central computing system. The remote computing device subsequently disconnects the link between itself and the specific local computing system (Step 220).
As would be known to a worker skilled in the art, personal computers or other computing systems typically have the ability to multi task. In one embodiment of the present invention, the communication between a remote computing device and a local computing system can be performed without the interruption of the tasks being performed by the local computing system being accessed. In a further embodiment of the invention, multiple remote computing devices can access the same local computing system at the same time, thereby producing a "many to one" relationship between the remote computing devices and a specific local computing system.

Claims

I claim:
1. A system providing a remote computing device access to the functionality of a local computing system using a public communication network, said system comprising: a) at least one remote computing device capable of accessing the public communication network; b) a central computing system having a central communications administrator installed thereon, said central computing system being capable of accessing the public communication network and a second communication network, said central communications administrator establishing a communication link between a remote computing device and a selected local computing system using said public communication network and said second communication network; c) at least one local computing system, each said local computing system having a unit communications manager installed thereon, said at least one local computing system being capable of accessing the second communication network, each unit communications manager maintaining communication between the central computing system and a local computing system enabling a remote computing device access to a selected local computing system thereby enabling a remote computing device to request a task be performed by the selected local computing system.
2. The system according to claim 1, wherein the second communication network is a public communication network.
3. The system according to claim 1, wherein said central communications administrator further enables authorisation for a local computing system to connect to the central computing system.
4. The system according to claiml, wherein the central communications administrator maintains a list of local computing systems which are active within the system.
5. The system according to claim 1, wherein said unit communications manager further enables authorisation for a user of a remote computing device to access the local computing system upon which it is installed.
6. The system according to claim 1, wherein said unit communications manager periodically contacts the central communications administrator using the second communication network, in order to maintain an active status within the system.
7. A method for providing a user of a remote computing device access to the functionality of a local computing system, said method comprising the steps- of: a) establishing a communication link between a remote computing device and a central communications administrator installed on a central computing system; b) authorising access to the central communications administrator by the user of the remote computing device; c) establishing a communication link between the remote computing device and a unit communications manager installed on a local computing system; d) authorising access to the unit communications manager by the user of the remote computing device; e) identifying a task to be executed by the local computing system; f) executing the identified task by the local computing system; and g) terminating the communication link between the remote computing device and the local computing system.
8. The method according to claim 7, wherein after step c) the central communications administrator generates a list of local computing systems to which the user of the remote computing device can request access, wherein said list comprises local computing systems which are network active.
9. The method according to claim 8, wherein the user selects a local computing system from the list.
10. The method according to claim 7, wherein after step d) the unit communications manager generates an interface for communication between the local computing system and the remote computing device.
11. The method according to claim 7, wherein after step d) the central communications administrator generates an interface for communication between the local computing system and the remote computing device.
12. A computer program product for providing a remote computing device access to the functionality of a local computing system, said computer program product comprising a computer readable storage medium including a first program and a second program, said first program including a set of instructions for: a) establishing a connection between a remote computing device and a local computing system through a central computing system; b) authorising a user to access the central computing system; and c) updating a list associating locations with particular local computing systems, thereby enabling contact of a particular local computing device by the central computing system; and said second program including a set of instructions for: a) translating information transmitted between a remote computing device and a local computing system; b) authorising a user to access a particular local computing system; and c) contacting, periodically, the central computing system, thereby updating a location with which the particular local computing system is associated.
PCT/CA2002/000471 2001-04-10 2002-04-10 System enabling remote access of a computing system WO2002084970A2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU2002249029A AU2002249029A1 (en) 2001-04-10 2002-04-10 System enabling remote access of a computing system

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CA2343618 2001-04-10
CA2,343,618 2001-04-10

Publications (2)

Publication Number Publication Date
WO2002084970A2 true WO2002084970A2 (en) 2002-10-24
WO2002084970A3 WO2002084970A3 (en) 2003-04-17

Family

ID=4168799

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CA2002/000471 WO2002084970A2 (en) 2001-04-10 2002-04-10 System enabling remote access of a computing system

Country Status (2)

Country Link
AU (1) AU2002249029A1 (en)
WO (1) WO2002084970A2 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014180417A1 (en) * 2013-10-08 2014-11-13 中兴通讯股份有限公司 Task migration method and network controller

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1998053581A1 (en) * 1997-05-19 1998-11-26 Coactive Networks, Inc. Server system and method for networking control networks and direct input/output devices with the world wide web
US5961594A (en) * 1996-09-26 1999-10-05 International Business Machines Corporation Remote node maintenance and management method and system in communication networks using multiprotocol agents
US6154843A (en) * 1997-03-21 2000-11-28 Microsoft Corporation Secure remote access computing system
DE19964186A1 (en) * 1999-01-13 2001-01-25 Tobias Kramer Arrangement for remote access to target computer has arrangements for establishing Internet connection to remote computer and releasing connection of device to target computer in response

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5961594A (en) * 1996-09-26 1999-10-05 International Business Machines Corporation Remote node maintenance and management method and system in communication networks using multiprotocol agents
US6154843A (en) * 1997-03-21 2000-11-28 Microsoft Corporation Secure remote access computing system
WO1998053581A1 (en) * 1997-05-19 1998-11-26 Coactive Networks, Inc. Server system and method for networking control networks and direct input/output devices with the world wide web
DE19964186A1 (en) * 1999-01-13 2001-01-25 Tobias Kramer Arrangement for remote access to target computer has arrangements for establishing Internet connection to remote computer and releasing connection of device to target computer in response

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014180417A1 (en) * 2013-10-08 2014-11-13 中兴通讯股份有限公司 Task migration method and network controller

Also Published As

Publication number Publication date
AU2002249029A1 (en) 2002-10-28
WO2002084970A3 (en) 2003-04-17

Similar Documents

Publication Publication Date Title
EP1834465B1 (en) Remote access system and method for enabling a user to remotely access a terminal equipment from a subscriber terminal
EP1311930B1 (en) System and method for authenticating a user to a web server
US8041815B2 (en) Systems and methods for managing network connectivity for mobile users
EP1042744B1 (en) Remote access-controlled communication
US20100197293A1 (en) Remote computer access authentication using a mobile device
US7082535B1 (en) System and method of controlling access by a wireless client to a network that utilizes a challenge/handshake authentication protocol
CN101277308B (en) Method for insulating inside and outside networks, authentication server and access switch
JP5813790B2 (en) Method and system for providing distributed wireless network services
US6785729B1 (en) System and method for authorizing a network user as entitled to access a computing node wherein authenticated certificate received from the user is mapped into the user identification and the user is presented with the opprtunity to logon to the computing node only after the verification is successful
US9344417B2 (en) Authentication method and system
US7895334B1 (en) Remote access communication architecture apparatus and method
CN103944890A (en) Virtual interaction system and method based on client/server mode
US20020152377A1 (en) System console device authentication in a network environment
CN101488857B (en) Authenticated service virtualization
WO2003107602A1 (en) Network security
US20180331886A1 (en) Systems and methods for maintaining communication links
JP2008263445A (en) Connection setting system, authentication apparatus, wireless terminal and connection setting method
JP2009277024A (en) Connection control method, communication system and terminal
EP1530343B1 (en) Method and system for creating authentication stacks in communication networks
KR100777537B1 (en) platform system for management dispersed network systems and dispersion management method
WO2002084970A2 (en) System enabling remote access of a computing system
KR100538924B1 (en) Method for providing Web Service, Remote Storage Service and Remote Control Service based on Peer-to-Peer between a Plurality of Client Terminals and Personal Computers Operated as Server
KR20040090220A (en) Network Device and Network System for Authentication and Method Therefor
RU2008109223A (en) ENSURING AN AGREED ACCESS TO THE FIREWALL WITH INFORMATION ON THE APPLICATION
JP4878043B2 (en) Access control system, connection control device, and connection control method

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ OM PH PL PT RO RU SD SE SG SI SK SL TJ TM TN TR TT TZ UA UG US UZ VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP

WWW Wipo information: withdrawn in national office

Country of ref document: JP