Browse Prior Art Database

Remote Control Security Solution Disclosure Number: IPCOM000014081D
Original Publication Date: 2001-Aug-26
Included in the Prior Art Database: 2003-Jun-19
Document File: 3 page(s) / 101K

Publishing Venue



The method uses Tivoli remote Control Trademark of Tivoli Systems Inc as the product to execute commands to take over remote machines via a Web Browser

This text was extracted from a PDF file.
At least one non-text object (such as an image or picture) has been suppressed.
This is the abbreviated version, containing approximately 53% of the total text.

Page 1 of 3

Remote Control Security Solution

The method uses Tivoli remote Control - Trademark of Tivoli Systems Inc - as the product to execute commands to take over remote machines via a Web Browser


Central Logging of remote control activity Ability to enable/disable remote control to any type of machines based on their specific role or function
Easy implementation Capability to use text files to enable/disable remote control of any workstation

The method uses a Central Relational Database where all the workstations are registered by function. Functions mean that the workstations are grouped according to their role. The name of the workstation is dependent on its role.

1) The workstations that will be used as controllers are flagged to indicate that characteristic in the Configuration Database
2) A table groups the functions to indicate that a controller would be able to remote control those machines belonging to that group
3) Validation policies are written to query the relational database and check whether that machine is able to control the specific target or not.
4) Logs are produced so Security administrators may control the behaviour of Remote Control
5) The controller proceeds to monitor the target (active control capturing keyboard and screen, or monitoring, just viewing what the remote user is doing)

Detailed Solution Description

The solution use a Configuration Database as the control engine of the system, a Web Server as the presentation mechanism, and several perl (cgi scripts) programs to be able to run queries to the relational database. The solution utilises a Configuration Database where workstations and their status is loaded. The machine names are standardize based on their role or function. The machine name used is as follows VVVFFnn where VVV is the location of the machine, FF is the function or role and nn is a sequential number. As the user logs on to the System the machine name is check out in the Configuration database. The configuration database is queried for those functions that may be controlled by the specific controller machine. Another front end application updates the location codes and their descriptions, function codes and descriptions, machine controllers and their associated function, and


Page 2 of 3

workstations and their status.


The following steps describe how the solution operates.

C onfiguration D atabase



D atabase C onnection

1W eb Server


Front-E nd


0) Control tables in the configura...