Movatterモバイル変換


[0]ホーム

URL:


US20030200469A1 - System, method and article of manufacture to remotely configure and utilize an emulated device controller via an encrypted validation communication protocol - Google Patents

System, method and article of manufacture to remotely configure and utilize an emulated device controller via an encrypted validation communication protocol
Download PDF

Info

Publication number
US20030200469A1
US20030200469A1US10/457,143US45714303AUS2003200469A1US 20030200469 A1US20030200469 A1US 20030200469A1US 45714303 AUS45714303 AUS 45714303AUS 2003200469 A1US2003200469 A1US 2003200469A1
Authority
US
United States
Prior art keywords
adaptor
client
central processing
driver
configuration
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US10/457,143
Inventor
R. Johnson
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US09/239,425external-prioritypatent/US6499108B1/en
Application filed by IndividualfiledCriticalIndividual
Priority to US10/457,143priorityCriticalpatent/US20030200469A1/en
Publication of US20030200469A1publicationCriticalpatent/US20030200469A1/en
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

Remote configuration and utilization of an emulated device controller via communication of encrypted data external to the controller. In a preferred embodiment, first and second software means executing within a server central processing unit facilitates secured and verified access to emulated input/output devices on behalf of a user community. The emulated input/output devices are further associated with session oriented application programs executed on one or more host central processing units. A user requests utilization of one or more emulated input/output device types whereupon the security software validates the user's request. If authorized, a hardware adaptor card is initialized with an input/output device configuration reflecting the user's request and control is passed to session oriented programs whereupon the user input/output requests are facilitated via an emulated device as opposed to physical devices associated with the host processors.

Description

Claims (21)

What is claimed is:
1. A system to facilitate remote configuration and utilization of an emulated device controller via communication of encrypted data external to said controller comprising:
at least one security administrator central processing unit communicably attached to an emulation server central processing unit;
at least one client central processing unit communicably attached to said emulation server central processing unit;
first software means for validating authorized remote user access and encryption of data, said first software executing from within said emulation server central processing unit;
second software means for facilitating remote configuration and utilization of an emulated device controller; said second software executing from within said emulation server central processing unit;
at least one hardware adaptor card communicably attached to said emulation server central processing unit; and
at least one host processor central processing unit communicably attached to said emulation server central processing unit via said hardware adaptor card.
2. The system to facilitate remote configuration and utilization of an emulated device controller in accordance withclaim 1 wherein said first software means is receptive to and processes data communicated from said second software means.
3. The system to facilitate remote configuration and utilization of an emulated device controller in accordance withclaim 1 wherein said second software means is receptive to and processes data communicated from said first software means.
4. The system to facilitate remote configuration and utilization of an emulated device controller in accordance withclaim 1 further comprising a communication means wherein data exchanged between said client central processing unit and said emulation server central processing unit is encrypted prior to transmission between said central processing units and decrypted subsequent to transmission between said central processing units.
5. The system to facilitate remote configuration and utilization of an emulated device controller in accordance withclaim 1 further comprising a communication means wherein data exchanged between said security administrator central processing unit and said emulation server central processing unit is encrypted prior to transmission between said central processing units and decrypted subsequent to transmission between said central processing units.
6. The system to facilitate remote configuration and utilization of an emulated device controller in accordance withclaim 1 wherein said second software means further comprises:
(a) a software component means for initializing said emulation server central processing unit;
(b) a software component means for terminating communication with said emulation server central processing unit;
(c) a software component means for loading said hardware adaptor with an emulated input/output device configuration;
(d) a software component means for recognizing and communicating with at least one client central processing unit;
(e) a software component means for disconnecting a previously recognized client; and
(f) a software component means for executing administrative support protocol.
7. A computer based method for facilitating remote configuration and utilization of an emulated device controller via communication of encrypted data external to said controller comprising:
(a) initializing and communicating with an emulation server central processing unit;
(b) establishing a client connection with said emulation server;
(c) loading a hardware adaptor card in communication with said emulation server with an emulated input/output device configuration;
(d) disconnecting said previously connected client; and
(e) terminating communication with said emulation server central processing unit.
8. The computer based method ofclaim 7 further including the execution of administrative support protocol.
9. The computer based method ofclaim 7 wherein said initializing of an emulation server central processing unit further comprises:
(a) initializing module-wide variables utilized by a hardware device driver;
(b) enumerating hardware adaptors using said adaptor's vendor and device identifiers;
(c) initializing hardware adaptor-specific variables utilized by said driver;
(d) allocating and reserving said adaptor resources;
(e) resetting said adaptor;
(f) downloading microcode to said adaptor;
(g) initializing said adaptor;
(h) requesting said adaptor's connection to each unique interrupt request line;
(i) initiating an adaptor timer and timer support;
(j) exposing standard module-wide support to applications;
(k) initializing variables utilized by a host dynamically linked library;
(l) clearing a user connection block;
(m) exposing and making available to first software an adaptor specific administrative instruction set;
(n) creating a serialization mechanism to be used by configuration support routines;
(o) opening said driver;
(p) requesting from said driver the number of recognized adaptors;
(q) returning from said driver the number of adaptors in response to immediately preceding request;
(r) requesting from said driver its version number;
(s) returning driver version number in response to immediately preceding request;
(t) recording driver version and the number of adaptors controlled by said driver;
(u) indicating said adaptor's unavailability;
(v) loading said adaptor's offline status;
(w) loading said adaptor's activity status;
(x) loading a second inactive configuration data sequence; and
(y) ensuring loaded adaptor configuration is within operational ranges.
10. The computer based method ofclaim 7 wherein terminating communication with said emulation server central processing unit further comprises:
(a) disconnecting each currently connected user;
(b) forcing recognized adaptors offline;
(c) closing a hardware device driver;
(d) freeing all allocated storage and resources;
(e) stopping all timers;
(f) eliminating module-wide exposure of support to applications;
(g) causing each adaptor to be offline and resetting each adaptor;
(h) disconnecting all previously connected interrupt request lines;
(i) destroying each adaptor object instance;
(j) destroying each adaptor's logical unit driver object instances;
(k) eliminating the exposure of logical unit support to applications; and
(i) freeing all allocated storage and resources.
11. The computer based method ofclaim 7 wherein said loading of a hardware adaptor with an emulated input/output device configuration further comprises:
(a) indicating said adaptor's unavailability;
(b) disconnecting client currently utilizing said adaptor;
(c) determining if adaptor should be online or offline to host processor;
(d) requesting actual or empty driver configuration for said adaptor predicated upon adaptor's online or offline status configuration;
(e) causing the adaptor to be offline to an associated channel;
(f) obviating each of said adaptor's logical unit driver object instances;
(g) eliminating exposure of logical unit support to applications;
(h) freeing all adaptor allocated storage and resources;
(i) determining if logical units are to be emulated;
(j) requesting said adaptor be brought online to an associated channel; and
(k) indicating said adaptor is availability for clients.
12. The computer based method ofclaim 7 wherein said establishing of a client connection further comprises:
(a) initializing client dependant variables;
(b) employing first software to effect a connection to a host dynamically linked library;
(c) retaining client name in said dynamically linked library;
(d) ascertaining authorized device types and security groups for said client;
(e) creating a new client object instance for said client;
(f) storing said client object in a user connection block;
(g) communicating to host dynamically linked library the command version level representing client's feature set;
(h) storing the client's command version level;
(i) sending to the host dynamically linked library emulated device type of interest;
(j) storing client's device type of interest;
(k) determining host dynamically linked library command version level;
(l) storing host dynamically linked libraries command version level;
(m) requesting currently available emulated devices of host dynamically linked library;
(n) returning response block in response to the client's request; and
(o) requesting from the host dynamically linked library to be connected to a logical unit.
13. The computer based method ofclaim 7 wherein said disconnecting of a previously connected client further comprises:
(a) closing logical unit connection;
(b) terminating threads created to perform input/output with the logical unit;
(c) setting the logical unit In-Use flag to “not in use”;
(d) setting the logical unit Client value to “none”;
(e) freeing all allocated storage and resources for said client object.
14. The computer based method ofclaim 7 wherein said execution of said administrative support protocol further comprises:
determining an instruction set sequence to execute based upon a user input command string; and
executing said determined instruction set sequence.
15. A computer readable medium encoded with a computer program for facilitating the remote configuration and utilization of an emulated device controller via communication of encrypted data comprising:
(a) an instruction set for initializing an emulation server central processing unit;
(b) an instruction set for terminating communication with said emulation server central processing unit;
(c) an instruction set for loading a hardware adaptor with an emulated input/output device configuration;
(d) an instruction set for establishing a client connection;
(e) an instruction set for disconnecting a previously connected client; and,.
(f) an instruction set for executing an administrative support protocol.
16. The computer program ofclaim 15 wherein said instruction set for initializing an emulation server central processing unit further comprises:
(a) initializing module-wide variables utilized by a hardware device driver;
(b) enumerating hardware adaptors using said adaptor's vendor and device identifiers;
(c) initializing hardware adaptor-specific variables utilized by said driver;
(d) allocating and reserving said adaptor resources;
(e) resetting said adaptor;
(f) downloading microcode to said adaptor;
(g) initializing said adaptor;
(h) requesting said adaptor's connection to each unique interrupt request line;
(i) initiating an adaptor timer and timer support;
(j) exposing standard module-wide support to applications;
(k) initializing variables utilized by a host dynamically linked library;
(l) clearing a user connection block;
(m) exposing and making available to first software an adaptor specific administrative instruction set;
(n) creating a serialization mechanism to be used by configuration support routines;
(o) opening said driver;
(p) requesting from said driver the number of recognized adaptors;
(q) returning from said driver the number of adaptors in response to immediately preceding request;
(r) requesting from said driver its version number;
(s) returning driver version number in response to immediately preceding request;
(t) recording driver version and the number of adaptors controlled by said driver;
(u) indicating said adaptor's unavailability;
(v) loading said adaptor's offline status;
(w) loading said adaptor's activity status;
(x) loading a second inactive configuration data sequence; and
(y) ensuring loaded adaptor configuration is within operational ranges.
17. The computer program ofclaim 15 wherein said instruction set for terminating communication with said emulation server central processing unit further comprises:
(a) disconnecting each currently connected user;
(b) forcing recognized adaptors offline;
(c) closing a hardware device driver;
(d) freeing all allocated storage and resources;
(e) stopping all timers;
(f) eliminating module-wide exposure of support to applications;
(g) causing each adaptor to be offline and resetting each adaptor;
(h) disconnecting all previously connected interrupt request lines;
(i) destroying each adaptor object instance;
(j) destroying each adaptor's logical unit driver object instances;
(k) eliminating the exposure of logical unit support to applications; and
(l) freeing all allocated storage and resources.
18. The computer program ofclaim 15 wherein said instruction set for loading a hardware adaptor with an emulated input/output device configuration further comprises:
(a) indicating said adaptor's unavailability;
(b) disconnecting client currently utilizing said adaptor;
(c) determining if adaptor should be online or offline to host processor;
(d) requesting actual or empty driver configuration for said adaptor predicated upon adaptor's online or offline status configuration;
(e) causing the adaptor to be offline to an associated channel;
(f) obviating each of said adaptor's logical unit driver object instances;
(g) eliminating exposure of logical unit support to applications;
(h) freeing all adaptor allocated storage and resources;
(i) determining if logical units are to be emulated;
(j) requesting said adaptor be brought online to an associated channel; and
(k) indicating said adaptor is availability for clients.
19. The computer program ofclaim 15 wherein said instruction set for establishing a client connection further comprises:
(a) initializing client dependant variables;
(b) employing first software to effect a connection to a host dynamically linked library;
(c) retaining client name in said dynamically linked library;
(d) ascertaining authorized device types and security groups for said client;
(e) creating a new client object instance for said client;
(f) storing said client object in a user connection block;
(g) communicating to host dynamically linked library the command version level representing client's feature set;
(h) storing the client's command version level;
(i) sending to the host dynamically linked library emulated device type of interest;
(j) storing client's device type of interest;
(k) determining host dynamically linked library command version level;
(l) storing host dynamically linked library's command version level;
(m) requesting currently available emulated devices of host dynamically linked library;
(n) returning response block in response to the client's request; and
(o) requesting from the host dynamically linked library to be connected to a logical unit.
20. The computer program ofclaim 15 wherein said instruction set for disconnecting a previously connected client further comprises:
(a) closing logical unit connection;
(b) terminating threads created to perform input/output with the logical unit;
(c) setting the logical unit In-Use flag to “not in use”;
(d) setting the logical unit Client value to “none”;
(e) freeing all allocated storage and resources for said client object.
21. The computer program ofclaim 15 wherein said instruction set for executing an administrative support protocol further comprises:
determining an instruction set sequence to execute based upon a user input command string; and
executing said determined instruction set sequence.
US10/457,1431996-11-192003-06-09System, method and article of manufacture to remotely configure and utilize an emulated device controller via an encrypted validation communication protocolAbandonedUS20030200469A1 (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
US10/457,143US20030200469A1 (en)1996-11-192003-06-09System, method and article of manufacture to remotely configure and utilize an emulated device controller via an encrypted validation communication protocol

Applications Claiming Priority (5)

Application NumberPriority DateFiling DateTitle
US75224996A1996-11-191996-11-19
US09/239,425US6499108B1 (en)1996-11-191999-01-28Secure electronic mail system
US25583799A1999-02-231999-02-23
US09/918,900US6578146B2 (en)1996-11-192001-08-01System, method and article of manufacture to remotely configure and utilize an emulated device controller via an encrypted validation communication protocol
US10/457,143US20030200469A1 (en)1996-11-192003-06-09System, method and article of manufacture to remotely configure and utilize an emulated device controller via an encrypted validation communication protocol

Related Parent Applications (3)

Application NumberTitlePriority DateFiling Date
US09/239,425Continuation-In-PartUS6499108B1 (en)1996-11-191999-01-28Secure electronic mail system
US25583799AContinuation-In-Part1996-11-191999-02-23
US09/918,900ContinuationUS6578146B2 (en)1996-11-192001-08-01System, method and article of manufacture to remotely configure and utilize an emulated device controller via an encrypted validation communication protocol

Publications (1)

Publication NumberPublication Date
US20030200469A1true US20030200469A1 (en)2003-10-23

Family

ID=25441146

Family Applications (2)

Application NumberTitlePriority DateFiling Date
US09/918,900Expired - LifetimeUS6578146B2 (en)1996-11-192001-08-01System, method and article of manufacture to remotely configure and utilize an emulated device controller via an encrypted validation communication protocol
US10/457,143AbandonedUS20030200469A1 (en)1996-11-192003-06-09System, method and article of manufacture to remotely configure and utilize an emulated device controller via an encrypted validation communication protocol

Family Applications Before (1)

Application NumberTitlePriority DateFiling Date
US09/918,900Expired - LifetimeUS6578146B2 (en)1996-11-192001-08-01System, method and article of manufacture to remotely configure and utilize an emulated device controller via an encrypted validation communication protocol

Country Status (2)

CountryLink
US (2)US6578146B2 (en)
EP (1)EP1282036B1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20020161596A1 (en)*2001-04-302002-10-31Johnson Robert E.System and method for validation of storage device addresses
US20050177792A1 (en)*2003-03-312005-08-11International Business Machines CorporationRemote configuration of intelligent software agents
US7039604B1 (en)*2001-02-152006-05-02Cisco Technology, Inc.Multi-vendor integration process for internet commerce

Families Citing this family (46)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US7505762B2 (en)2004-02-272009-03-17Fusionone, Inc.Wireless telephone data backup system
US6671757B1 (en)2000-01-262003-12-30Fusionone, Inc.Data transfer and synchronization system
US8620286B2 (en)2004-02-272013-12-31Synchronoss Technologies, Inc.Method and system for promoting and transferring licensed content and applications
US8156074B1 (en)2000-01-262012-04-10Synchronoss Technologies, Inc.Data transfer and synchronization system
US8073954B1 (en)2000-07-192011-12-06Synchronoss Technologies, Inc.Method and apparatus for a secure remote access system
US6892225B1 (en)*2000-07-192005-05-10Fusionone, Inc.Agent system for a secure remote access system
US7895334B1 (en)2000-07-192011-02-22Fusionone, Inc.Remote access communication architecture apparatus and method
GB2367709B (en)*2000-10-072003-05-21Complementary Tech LtdImprovements in or relating to communications
US7818435B1 (en)2000-12-142010-10-19Fusionone, Inc.Reverse proxy mechanism for retrieving electronic content associated with a local network
US7260845B2 (en)*2001-01-092007-08-21Gabriel KedmaSensor for detecting and eliminating inter-process memory breaches in multitasking operating systems
US8615566B1 (en)2001-03-232013-12-24Synchronoss Technologies, Inc.Apparatus and method for operational support of remote network systems
US20020174365A1 (en)*2001-05-212002-11-21Vadim AntonovEnhanced communication scheme for objects in multi-host environments
US7293179B2 (en)*2001-08-012007-11-06Johnson R BrentSystem and method for virtual tape management with remote archival and retrieval via an encrypted validation communication protocol
US7839987B1 (en)2001-11-012010-11-23Callwave, Inc.Methods and systems for creating a dynamic call log and contact records
EP1335558A1 (en)*2002-02-062003-08-13SwissSign AGMethods and apparatus for secure data management, secure data retrieval and routing
US7277934B2 (en)2002-05-012007-10-02Dell Products L.P.System and method for configuring a platform event trap destination address
US7200546B1 (en)*2002-09-052007-04-03Ultera Systems, Inc.Tape storage emulator
US7590712B2 (en)*2002-09-102009-09-15Ge Fanuc Automation North America, Inc.Methods and systems for management and control of an automation control module
US7643983B2 (en)*2003-03-282010-01-05Hewlett-Packard Development Company, L.P.Data storage system emulation
US7814338B2 (en)*2003-06-092010-10-12Johnson R BrentSystem and method for virtual tape management with creation and management options
EP1652048A4 (en)2003-07-212009-04-15Fusionone IncDevice message management system
US7263685B2 (en)*2003-09-122007-08-28Intel CorporationSynchronizing use of a device by multiple software components in accordance with information stored at the device
GB2407659A (en)*2003-10-312005-05-04Hewlett Packard Development CoDisaster recovery using multiple boot images held on a sequential storage device
US7634509B2 (en)2003-11-072009-12-15Fusionone, Inc.Personal information space management system and method
EP1759521B1 (en)2004-05-122016-06-29Synchronoss Technologies, Inc.Advanced contact identification system
US9542076B1 (en)2004-05-122017-01-10Synchronoss Technologies, Inc.System for and method of updating a personal profile
US8499337B1 (en)2004-10-062013-07-30Mcafee, Inc.Systems and methods for delegation and notification of administration of internet access
US7631213B2 (en)*2004-12-062009-12-08Johnson R BrentData center virtual tape off-site disaster recovery planning and implementation system
US7818734B2 (en)2005-01-212010-10-19Callwave, Inc.Methods and systems for transferring data over a network
US20060206922A1 (en)*2005-03-082006-09-14Securedatainnovations AgSecure Remote Access To Non-Public Private Web Servers
US7965825B1 (en)2005-05-022011-06-21Callwave, Inc.Methods and systems for transferring voice messages and faxes over a network
JP4741292B2 (en)*2005-06-092011-08-03株式会社日立製作所 Device management system
US7512775B2 (en)*2006-02-062009-03-31Evalue Technology Inc.Method for initializing and actuating a peripheral and device for performing the method
US8121626B1 (en)2006-06-052012-02-21Callwave, Inc.Method and systems for short message forwarding services
US7536596B2 (en)*2006-08-252009-05-19Johnson R BrentRemotely controlled channel emulator for testing of mainframe peripherals
US7596651B2 (en)*2007-05-292009-09-29International Business Machines CorporationMulti-character adapter card
US8561136B2 (en)*2007-10-102013-10-15R. Brent JohnsonSystem to audit, monitor and control access to computers
US8181111B1 (en)2007-12-312012-05-15Synchronoss Technologies, Inc.System and method for providing social context to digital activity
US8214584B2 (en)*2008-08-292012-07-03Johnson R BrentSecure virtual tape management system with early read support options
US8423604B2 (en)*2008-08-292013-04-16R. Brent JohnsonSecure virtual tape management system with balanced storage and multi-mirror options
US20100057790A1 (en)*2008-08-292010-03-04Johnson R BrentSecure virtual tape management system with console and catalog monitoring and updating
US8359574B1 (en)*2009-01-162013-01-22Adobe Systems IncorporatedOffline mode in IDE for seamless service-oriented-architecture-based application development
US8255006B1 (en)2009-11-102012-08-28Fusionone, Inc.Event dependent notification system and method
US8943428B2 (en)2010-11-012015-01-27Synchronoss Technologies, Inc.System for and method of field mapping
GB2500597B (en)*2012-03-262014-06-18Streetcloud LtdData server
US9864864B2 (en)*2014-09-232018-01-09Accenture Global Services LimitedIndustrial security agent platform

Citations (22)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US4030072A (en)*1974-12-181977-06-14Xerox CorporationComputer system operation and control
US4182933A (en)*1969-02-141980-01-08The United States Of America As Represented By The Secretary Of The ArmySecure communication system with remote key setting
US4310720A (en)*1978-03-311982-01-12Pitney Bowes Inc.Computer accessing system
US4430728A (en)*1981-12-291984-02-07Marathon Oil CompanyComputer terminal security system
US4531023A (en)*1982-08-131985-07-23Hlf CorporationComputer security system for a time shared computer accessed over telephone lines
US4578531A (en)*1982-06-091986-03-25At&T Bell LaboratoriesEncryption system key distribution method and apparatus
US4763351A (en)*1985-04-241988-08-09Lipscher Bernard NComputer security system
US4965804A (en)*1989-02-031990-10-23Racal Data Communications Inc.Key management for encrypted packet based networks
US5122948A (en)*1990-06-281992-06-16Allen-Bradley Company, Inc.Remote terminal industrial control communication system
US5179695A (en)*1990-09-041993-01-12International Business Machines CorporationProblem analysis of a node computer with assistance from a central site
US5204961A (en)*1990-06-251993-04-20Digital Equipment CorporationComputer network operating with multilevel hierarchical security with selectable common trust realms and corresponding security protocols
US5237677A (en)*1989-11-081993-08-17Hitachi, Ltd.Monitoring and controlling system and method for data processing system
US5347578A (en)*1992-03-171994-09-13International Computers LimitedComputer system security
US5416842A (en)*1994-06-101995-05-16Sun Microsystems, Inc.Method and apparatus for key-management scheme for use with internet protocols at site firewalls
US5452460A (en)*1993-01-271995-09-19International Business Machines CorporationMethod and apparatus for creating secure pseudo-terminal links
US5537554A (en)*1990-07-061996-07-16Ricoh Company, Ltd.Method and apparatus for controlling and communicating with business office devices
US5550984A (en)*1994-12-071996-08-27Matsushita Electric Corporation Of AmericaSecurity system for preventing unauthorized communications between networks by translating communications received in ip protocol to non-ip protocol to remove address and routing services information
US5598536A (en)*1994-08-091997-01-28Shiva CorporationApparatus and method for providing remote users with the same unique IP address upon each network access
US5678002A (en)*1995-07-181997-10-14Microsoft CorporationSystem and method for providing automated customer support
US5892900A (en)*1996-08-301999-04-06Intertrust Technologies Corp.Systems and methods for secure transaction management and electronic rights protection
US5970149A (en)*1996-11-191999-10-19Johnson; R. BrentCombined remote access and security system
US6275855B1 (en)*1997-11-022001-08-14R. Brent JohnsonSystem, method and article of manufacture to enhance computerized alert system information awareness and facilitate real-time intervention services

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US6101543A (en)*1996-10-252000-08-08Digital Equipment CorporationPseudo network adapter for frame capture, encapsulation and encryption
US6499108B1 (en)1996-11-192002-12-24R. Brent JohnsonSecure electronic mail system
WO2000000879A2 (en)*1998-03-042000-01-06Internet Dynamics, Inc.Generalized policy server
AU4712501A (en)*1999-12-102001-06-25Sun Microsystems, Inc.Scalable security associations for groups for use in a private network using a public-network infrastrucure

Patent Citations (22)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US4182933A (en)*1969-02-141980-01-08The United States Of America As Represented By The Secretary Of The ArmySecure communication system with remote key setting
US4030072A (en)*1974-12-181977-06-14Xerox CorporationComputer system operation and control
US4310720A (en)*1978-03-311982-01-12Pitney Bowes Inc.Computer accessing system
US4430728A (en)*1981-12-291984-02-07Marathon Oil CompanyComputer terminal security system
US4578531A (en)*1982-06-091986-03-25At&T Bell LaboratoriesEncryption system key distribution method and apparatus
US4531023A (en)*1982-08-131985-07-23Hlf CorporationComputer security system for a time shared computer accessed over telephone lines
US4763351A (en)*1985-04-241988-08-09Lipscher Bernard NComputer security system
US4965804A (en)*1989-02-031990-10-23Racal Data Communications Inc.Key management for encrypted packet based networks
US5237677A (en)*1989-11-081993-08-17Hitachi, Ltd.Monitoring and controlling system and method for data processing system
US5204961A (en)*1990-06-251993-04-20Digital Equipment CorporationComputer network operating with multilevel hierarchical security with selectable common trust realms and corresponding security protocols
US5122948A (en)*1990-06-281992-06-16Allen-Bradley Company, Inc.Remote terminal industrial control communication system
US5537554A (en)*1990-07-061996-07-16Ricoh Company, Ltd.Method and apparatus for controlling and communicating with business office devices
US5179695A (en)*1990-09-041993-01-12International Business Machines CorporationProblem analysis of a node computer with assistance from a central site
US5347578A (en)*1992-03-171994-09-13International Computers LimitedComputer system security
US5452460A (en)*1993-01-271995-09-19International Business Machines CorporationMethod and apparatus for creating secure pseudo-terminal links
US5416842A (en)*1994-06-101995-05-16Sun Microsystems, Inc.Method and apparatus for key-management scheme for use with internet protocols at site firewalls
US5598536A (en)*1994-08-091997-01-28Shiva CorporationApparatus and method for providing remote users with the same unique IP address upon each network access
US5550984A (en)*1994-12-071996-08-27Matsushita Electric Corporation Of AmericaSecurity system for preventing unauthorized communications between networks by translating communications received in ip protocol to non-ip protocol to remove address and routing services information
US5678002A (en)*1995-07-181997-10-14Microsoft CorporationSystem and method for providing automated customer support
US5892900A (en)*1996-08-301999-04-06Intertrust Technologies Corp.Systems and methods for secure transaction management and electronic rights protection
US5970149A (en)*1996-11-191999-10-19Johnson; R. BrentCombined remote access and security system
US6275855B1 (en)*1997-11-022001-08-14R. Brent JohnsonSystem, method and article of manufacture to enhance computerized alert system information awareness and facilitate real-time intervention services

Cited By (4)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US7039604B1 (en)*2001-02-152006-05-02Cisco Technology, Inc.Multi-vendor integration process for internet commerce
US20020161596A1 (en)*2001-04-302002-10-31Johnson Robert E.System and method for validation of storage device addresses
US20050177792A1 (en)*2003-03-312005-08-11International Business Machines CorporationRemote configuration of intelligent software agents
US7925984B2 (en)*2003-03-312011-04-12International Business Machines CorporationRemote configuration of intelligent software agents

Also Published As

Publication numberPublication date
EP1282036A3 (en)2008-01-09
EP1282036B1 (en)2018-03-07
EP1282036A2 (en)2003-02-05
US6578146B2 (en)2003-06-10
US20010047471A1 (en)2001-11-29

Similar Documents

PublicationPublication DateTitle
US6578146B2 (en)System, method and article of manufacture to remotely configure and utilize an emulated device controller via an encrypted validation communication protocol
US7334119B2 (en)Method, system, apparatus, and program product for temporary personalization of a computer terminal
KR100188503B1 (en)Authenticating remote users in a distributed environment
US7076796B2 (en)Virtual media from a directory service
US7640382B2 (en)Virtual media systems, methods and devices
EP1473618B1 (en)Uniform modular framework for a host computer system
US5889942A (en)Secured system for accessing application services from a remote station
US9213513B2 (en)Maintaining synchronization of virtual machine image differences across server and host computers
US9392078B2 (en)Remote network access via virtual machine
US6393569B1 (en)Secured system for accessing application services from a remote station
US8924964B2 (en)Dynamic allocation and assignment of virtual environment
US6895588B1 (en)Remote device access over a network
US7039724B1 (en)Programmable command-line interface API for managing operation of a network device
RU2625721C2 (en)Method and device for controlling access to computer system
US7320071B1 (en)Secure universal serial bus
US20020095595A1 (en)Method, system and program for sharing the ability to set configuration parameters in a network environment
US11563799B2 (en)Peripheral device enabling virtualized computing service extensions
US20080181415A1 (en)Systems and Arrangements to Adjust Resource Accessibility Based Upon Usage Modes
US5675771A (en)Mechanism for enabling emulation system users to directly invoke a number of host system facilities for executing host procedures either synchronously or asynchronously in a secure manner through automatically created shell mechanisms
WO2009005935A2 (en)Using a trusted entity to drive security decisions
US7788392B2 (en)Mechanism for universal media redirection control
KR20060087758A (en) Internet disk system and method for mobile devices
KR20010040981A (en)Stack-based security requirements

Legal Events

DateCodeTitleDescription
STCBInformation on status: application discontinuation

Free format text:ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION


[8]ページ先頭

©2009-2025 Movatter.jp