throbber
(12)
`
`United States Patent
`Carley
`
`(10) Patent No.:
`(45) Date of Patent:
`
`US 7,325,140 B2
`Jan. 29, 2008
`
`USOO7325 140B2
`
`(54) SECURE MANAGEMENT ACCESS
`CONTROL FOR COMPUTERS, EMBEDDED
`AND CARD EMBODIMENT
`
`(75) Inventor: Jeffrey Alan Carley, Colorado Springs,
`CO (US)
`(73) Assignee: Engedi Technologies, Inc., Virginia
`Beach, VA (US)
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 257 days.
`
`(*) Notice:
`
`(21) Appl. No.: 10/969,561
`
`(22) Filed:
`(65)
`
`Oct. 20, 2004
`Prior Publication Data
`US 2005/0086494 A1
`Apr. 21, 2005
`O
`O
`Related U.S. Application Data
`(63) Continuation-in-part of application No. 10/461,827,
`filed on Jun. 13, 2003.
`(60) Provisional application No. 60/512,777, filed on Oct.
`21, 2003.
`(51) Int. Cl
`we
`(2006.01)
`H04L 9/00
`713/182: 726/2: 726/3
`52) U.S. C
`(52) U.S. Cl. "70022. 709,224. 700,217
`58) Field of Classification Search s
`713/1s2.
`(58) Field of Classification Search ................
`s
`726/23: 709/223-224, 217, 219; 370/335;
`455/3.03
`See application file for complete search history.
`References Cited
`
`(56)
`
`U.S. PATENT DOCUMENTS
`
`5,689,566 A 11/1997 Nguyen
`
`
`
`Remote Administrator
`
`5,968,176 A * 10/1999 Nessett et al. ................ T26/11
`6,335,927 B1
`1, 2002 Elliott
`6,560,222 B1
`5/2003 Pounds
`6,894,994 B1* 5/2005 Grob et al. ................. 370,335
`2002/0001302 A1
`1/2002 Pickett
`2002fOO64149 A1
`5, 2002 Elliott
`2003/0093563 A1
`5/2003 Young
`
`OTHER PUBLICATIONS
`Harikrishnan, Hari; Advanced security for data, voice, and video
`access ideal for Small offices and teleworkers; Introducing Cisco
`836 and SOHO 96 Secure Broadband Routers, Cisco.com; Mar.
`2003; pp. 1-14.
`Hardware you need FAST: Symbiat (online); Copyright 2002: pp.
`1-2.
`
`* cited by examiner
`Primary Examiner T. B. Truong
`(74) Attorney, Agent, or Firm—John H. Thomas, P.C.
`
`(57)
`
`ABSTRACT
`
`A computer network management system for remotely man
`aging a network device. The system includes a secure
`management access controller which is in direct communi
`cation with the network device. The secure management
`access controller provides access for remotely and securely
`managing a network. The secure management access con
`troller further separates management communications from
`user communications to ensure the security of the manage
`ment communications. The system further includes network
`and power monitoring and notification systems. The system
`further provides authentication and authorization capabili
`ties for security purposes.
`
`16 Claims, 32 Drawing Sheets
`
`ss Control
`erver-1
`
`4
`Network
`Management
`
`Network Operations
`Center Network
`
`NP. i.
`server .
`
`Firewal
`
`DNS
`Server
`
`Secured Network
`
`SMACC
`
`WN Turne
`
`Out-of-Bard Network
`f
`Secondary Network
`
`-Bardata Network
`
`Lenovo
`Ex. 1002 - Page 1
`
`

`

`U.S. Patent
`
`Jan. 29, 2008
`
`Sheet 1 of 32
`
`US 7,325,140 B2
`
`
`
`User Data Interface
`
`System Controller
`
`Fig. 1
`
`Lenovo
`Ex. 1002 - Page 2
`
`

`

`U.S. Patent
`
`Jan. 29, 2008
`
`Sheet 2 of 32
`
`US 7,325,140 B2
`
`
`
`Optional UPS
`
`Circuit 1
`
`Power Supply
`
`
`
`
`
`Circuit 2
`
`User Data
`interface
`
`Controller
`
`Fig. 2
`
`Lenovo
`Ex. 1002 - Page 3
`
`

`

`U.S. Patent
`
`Jan. 29, 2008
`
`Sheet 3 of 32
`
`US 7,325,140 B2
`
`Virtual Management interface (VM)
`
`
`
`
`
`
`
`SMACC Network Enabled
`Management Interface
`
`Local Console
`
`
`
`Fig. 3
`
`Lenovo
`Ex. 1002 - Page 4
`
`

`

`U.S. Patent
`
`Jan. 29, 2008
`
`Sheet 4 of 32
`
`US 7,325,140 B2
`
`Remote Administrator
`
`Out-of-Band Network
`o
`Secondary Network
`
`SNACC
`interface
`
`Network
`Management
`Station
`
`Network Operations
`Center Network
`
`
`
`
`
`
`
`
`
`
`
`
`
`Secured Network
`
`
`
`n-Band Data Network
`
`Fig. 4
`
`Lenovo
`Ex. 1002 - Page 5
`
`

`

`U.S. Patent
`
`Jan. 29, 2008
`
`Sheet S of 32
`
`US 7,325,140 B2
`
`Remote Administrator
`
`Network
`Management
`
`Statics
`
`W
`
`Network Operations
`Center Network
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Out-of-Band Network
`O
`Secondary Network
`
`WPN Turne
`
`WPN The
`
`Secured Network
`
`
`
`n-Band Data Network
`
`Fig. 5
`
`Lenovo
`Ex. 1002 - Page 6
`
`

`

`U.S. Patent
`
`Jan. 29, 2008
`
`Sheet 6 of 32
`
`US 7,325,140 B2
`
`Packet Filtering for packets received on VMI of SMACC interfaces
`
`acket fro
`allowed
`Source?
`
`
`
`Log and discard
`
`
`
`
`
`
`
`
`
`Packet
`destination
`managed
`device?
`
`
`
`Process
`management
`request
`
`Fig. 6
`
`Lenovo
`Ex. 1002 - Page 7
`
`

`

`U.S. Patent
`
`Jan. 29, 2008
`
`Sheet 7 of 32
`
`US 7,325,140 B2
`
`
`
`
`
`
`
`
`
`
`
`
`
`Start Services
`Connection
`
`
`
`available Over
`Current
`Qnnection?
`
`Last
`Connection in
`CQnfigured li
`
`Make next
`Connection Current
`Connection
`
`
`
`Establish
`Connection to
`Service over
`Current Connection
`
`
`
`Log failure to
`Connect to Service
`
`Fig. 7
`
`Lenovo
`Ex. 1002 - Page 8
`
`

`

`U.S. Patent
`
`Jan. 29, 2008
`
`Sheet 8 of 32
`
`US 7,325,140 B2
`
`Start Service LOSS
`
`Connection to
`SRAM Service lost
`
`Make next
`Connection Current
`
`available Over
`Current
`Qnnectio
`
`Entire list
`attampted?
`
`Establish
`Connection to
`Service over
`Current Connection
`
`
`
`Wait configured
`amount of time
`
`End
`
`Fig. 8
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Lenovo
`Ex. 1002 - Page 9
`
`

`

`U.S. Patent
`
`Jan. 29, 2008
`
`Sheet 9 of 32
`
`US 7,325,140 B2
`
`
`
`Flash
`
`NVRAM
`
`SMACC CPU Bus
`
`
`
`Analog Line
`
`Fig. 9
`
`Lenovo
`Ex. 1002 - Page 10
`
`

`

`U.S. Patent
`
`Jan. 29, 2008
`
`Sheet 10 of 32
`
`US 7,325,140 B2
`
`Flash
`
`NVRAM
`
`RAM
`
`UART
`
`
`
`
`
`SMACC CPUBUS
`
`Ethernet
`
`Ethernet
`Connection
`
`Fig. 10
`
`Lenovo
`Ex. 1002 - Page 11
`
`

`

`U.S. Patent
`
`Jan. 29, 2008
`
`Sheet 11 of 32
`
`US 7,325,140 B2
`
`Cell Tower
`
`Flash
`
`NVRAM
`
`RAM
`
`
`
`SMACC CPUBUS
`
`Packet
`Cellular
`
`Fig. 11
`
`Lenovo
`Ex. 1002 - Page 12
`
`

`

`U.S. Patent
`
`Jan. 29, 2008
`
`Sheet 12 of 32
`
`US 7,325,140 B2
`
`NVRAM
`
`SMACC Slot
`
`
`
`SMACC CPU Bus
`
`
`
`PC
`Interface
`
`SMACC
`Interface
`Card
`
`Fig. 12
`
`Lenovo
`Ex. 1002 - Page 13
`
`

`

`U.S. Patent
`
`Jan. 29, 2008
`
`Sheet 13 of 32
`
`US 7,325,140 B2
`
`UART
`
`SMACC
`Interface
`Logic
`
`
`
`SMACC
`Interface
`Logic
`
`Flash
`
`NVRAM
`
`RAM
`
`SMACC CPU Bus
`
`SMACC
`
`System
`PC
`Bus
`
`System
`CPU
`BuS
`
`Fig. 13
`
`Lenovo
`Ex. 1002 - Page 14
`
`

`

`U.S. Patent
`
`Jan. 29, 2008
`
`Sheet 14 of 32
`
`US 7,325,140 B2
`
`
`
`UART
`
`UART
`
`Boot ROM
`
`Flash
`
`NVRAM
`
`SMACC
`
`CPU
`
`CPU
`Bus
`
`System Controller
`
`Fig. 14
`
`Lenovo
`Ex. 1002 - Page 15
`
`

`

`U.S. Patent
`
`Jan. 29, 2008
`
`Sheet 15 Of 32
`
`US 7,325,140 B2
`
`
`
`Telephone
`Line
`-48V
`
`Out
`
`R1
`
`Fig. 15
`
`Lenovo
`Ex. 1002 - Page 16
`
`

`

`U.S. Patent
`
`Jan. 29, 2008
`
`Sheet 16 of 32
`
`US 7,325,140 B2
`
`Initialize dial tone
`timer
`
`Wait for dial tone
`test timer to pop.
`
`Take line off hook.
`
`
`
`
`
`
`
`
`
`
`ls dial tone
`detected?
`
`Reset dial tone
`test timer.
`
`Send Alert to
`Management
`Center
`
`Fig. 16
`
`Lenovo
`Ex. 1002 - Page 17
`
`

`

`U.S. Patent
`
`Jan. 29, 2008
`
`Sheet 17 Of 32
`
`US 7,325,140 B2
`
`NWR
`
`SMACC Bus
`
`UART
`
`
`
`SMACC
`
`Power Supply
`
`S
`
`yS
`to
`Userbata -- B
`Interface
`US
`
`CPU
`
`System
`Controller
`
`Circuit
`
`Fig. 17
`
`Lenovo
`Ex. 1002 - Page 18
`
`

`

`U.S. Patent
`
`Jan. 29, 2008
`
`Sheet 18 of 32
`
`US 7,325,140 B2
`
`
`
`SMACC CPUBUS
`
`PC Card Interface
`
`Fig. 18
`
`Lenovo
`Ex. 1002 - Page 19
`
`

`

`U.S. Patent
`
`Jan. 29, 2008
`
`Sheet 19 Of 32
`
`US 7,325,140 B2
`
`
`
`CPU
`
`Boot ROM
`
`System
`Controller
`
`Flash
`
`NVRAM
`
`Fig. 19
`
`Lenovo
`Ex. 1002 - Page 20
`
`

`

`U.S. Patent
`
`Jan. 29, 2008
`
`Sheet 20 of 32
`
`US 7,325,140 B2
`
`Flash
`
`SMACC Bus
`
`SMACC
`
`CPU
`
`UART
`
`UART
`
`
`
`
`
`
`
`
`
`User Data Interface
`
`Boot ROM
`
`User Data Interface
`
`Proxy Management
`interface
`
`Sys
`Bus
`
`CPU
`Bus
`
`System Controller
`
`Flash
`
`Fig. 20
`
`Lenovo
`Ex. 1002 - Page 21
`
`

`

`U.S. Patent
`
`Jan. 29, 2008
`
`Sheet 21 of 32
`
`US 7,325,140 B2
`
`
`
`Virtual Management
`Interface (VMI)
`
`User Data Interface
`
`User Data Interface
`User Interface configured as a
`Proxy Management Interface
`
`SMACC Network Enabled
`Management interface
`
`Local Console
`
`Fig. 21
`
`Lenovo
`Ex. 1002 - Page 22
`
`

`

`U.S. Patent
`
`Jan. 29, 2008
`
`Sheet 22 of 32
`
`US 7,325,140 B2
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Remote Administrator
`
`8
`Network
`is
`Management s
`Statio
`
`Network Operations
`Center Network
`
`a Na
`
`Firewal
`
`(s.3
`
`imaged
`
`f
`
`dedicated
`Management Console
`Segment
`
`
`
`Out-of-Band Network
`O
`Secondary Network
`
`WPNTurne
`
`Sise
`
`WPN turne
`
`Secured Network
`
`In-Band Data Network
`
`Fig. 22
`
`Lenovo
`Ex. 1002 - Page 23
`
`

`

`U.S. Patent
`
`Jan. 29, 2008
`
`Sheet 23 of 32
`
`US 7,325,140 B2
`
`
`
`SMACC CPU BuS
`
`Ethernet
`
`PC Card Interface
`
`Fig. 23
`
`Lenovo
`Ex. 1002 - Page 24
`
`

`

`U.S. Patent
`
`Jan. 29, 2008
`
`Sheet 24 of 32
`
`US 7,325,140 B2
`
`
`
`Cell Tower
`
`SMACC CPUBUS
`
`Packet Cellular
`
`PC Card Interface
`
`Fig. 24
`
`Lenovo
`Ex. 1002 - Page 25
`
`

`

`U.S. Patent
`
`Jan. 29, 2008
`
`Sheet 25 of 32
`
`US 7,325,140 B2
`
`
`
`SMACC CPU BuS
`
`Analog Modem
`
`PC Card Interface
`
`Fig. 25
`
`Lenovo
`Ex. 1002 - Page 26
`
`

`

`U.S. Patent
`
`Jan. 29, 2008
`
`Sheet 26 of 32
`
`US 7,325,140 B2
`
`SMACC
`Interface
`Logic
`
`SMACC
`Interface
`Logic
`
`S
`M A
`C
`C
`
`S
`M A
`C
`C
`
`Flash
`
`NVRAM
`
`RAM
`
`
`
`SMACC CPUBUS
`
`SMACC
`
`PC Card interface
`
`Fig. 26
`
`Lenovo
`Ex. 1002 - Page 27
`
`

`

`U.S. Patent
`
`Jan. 29, 2008
`
`Sheet 27 Of 32
`
`US 7,325,140 B2
`
`
`
`
`
`
`
`
`
`
`
`
`
`NVRAM
`
`RAM
`
`
`
`SMACC
`Interface
`Logic
`
`SMACC CPU Bus
`
`
`
`Proxy
`Management
`Proxy
`Management
`Interface
`
`
`
`PC Card Interface
`
`Fig. 27
`
`Lenovo
`Ex. 1002 - Page 28
`
`

`

`U.S. Patent
`
`Jan. 29, 2008
`
`Sheet 28 of 32
`
`US 7,325,140 B2
`
`SMACC Bus
`
`
`
`
`
`Bus Controller
`
`SMACC Processor
`
`System PCI Bus
`
`Fig. 28
`
`Lenovo
`Ex. 1002 - Page 29
`
`

`

`U.S. Patent
`
`Jan. 29, 2008
`
`Sheet 29 Of 32
`
`US 7,325,140 B2
`
`SMACC Bus
`
`
`
`
`
`Bus Controller
`
`
`
`SMACC processor
`
`System CPU Bus
`
`Fig. 29
`
`Lenovo
`Ex. 1002 - Page 30
`
`

`

`U.S. Patent
`
`Jan. 29, 2008
`
`Sheet 30 of 32
`
`US 7,325,140 B2
`
`SMACC CPU Bus
`
`
`
`UART
`
`SMACC
`Interface
`Logic
`
`Fig. 30
`
`Lenovo
`Ex. 1002 - Page 31
`
`

`

`U.S. Patent
`
`Jan. 29, 2008
`
`Sheet 31 of 32
`
`US 7,325,140 B2
`
`
`
`Device Power
`Switch turned On.
`
`Power up SMACC
`Circuit.
`
`Power up main
`processor
`
`Fig. 31
`
`Lenovo
`Ex. 1002 - Page 32
`
`

`

`U.S. Patent
`
`Jan. 29, 2008
`
`Sheet 32 of 32
`
`US 7,325,140 B2
`
`incoming Call
`
`
`
`Call pass Call
`filter?
`
`Answer Call
`
`Fast Hangup
`
`Fig. 32
`
`Lenovo
`Ex. 1002 - Page 33
`
`

`

`US 7,325,140 B2
`
`1.
`SECURE MANAGEMENT ACCESS
`CONTROL FOR COMPUTERS, EMBEDDED
`AND CARD EMBODIMIENT
`
`CROSS REFERENCE TO RELATED
`APPLICATIONS
`
`The present application is a continuation in part based on
`U.S. patent application Ser. No. 10/461,827, filed Jun. 13,
`2003. The present application claims priority from U.S.
`Provisional Application Ser. No. 60/512,777, filed Oct. 21,
`2003. The present invention is related to the invention
`described in co-owned, co-pending patent application Ser.
`No. 10/461,820 filed on Jun. 13, 2003, incorporated herein
`by reference.
`
`10
`
`15
`
`TECHNICAL FIELD OF THE INVENTION
`
`The present invention relates in general to methods and
`apparatus used in managing devices or systems in a com
`munication network and more particularly to methods and
`apparatus for remote management of these devices or sys
`tems in a secure manner.
`
`BACKGROUND OF THE INVENTION
`
`25
`
`2
`The struggle to find a workable compromise between the
`utility of remote management of devices and the need to
`maintain the security of the devices can clearly be seen in
`“The Router Security Configuration Guide” published by the
`National Security Agency. On page 49 of the guide it is
`recommended that a terminal (or computer) be a stand-alone
`device protected from unauthorized access. This goes back
`to requiring physical access to the network element in order
`to access the console or management port. On page 47 the
`guide also states, "Permitting direct dial-in to any vital piece
`of network infrastructure is potentially very risky .
`.
`.
`.
`In-band management methods often depend to one degree or
`another on the security of the network the element is a part
`of to protect the management traffic. While this MIGHT
`provide a reasonable level of protection from external
`attacks (initiated from outside the network), it generally will
`not provide a sufficient level of protection from an internal
`attack (initiated from inside a network). To help reduce the
`Vulnerability to internal attack, the “The Router Security
`Configuration Guide” has recommendation using a dedi
`cated network or at least dedicated network segments for
`remote network administration of routers. Building out a
`dedicated network for management would be quite expen
`sive for most networks.
`There are definite advantages to having an out-of-band
`remote management connection to network elements that
`utilize connectivity that is diverse from the primary network
`connection. One of the primary purposes of the remote
`management connection is to assist the remote administrator
`or technician in troubleshooting network problems. With
`in-band management, if a network problem has hindered
`connectivity to a network element, management connectiv
`ity to that element could be lost when it is needed the most.
`An out-of-band management Solution is more likely to allow
`the administrator or technician to still remotely access the
`network element to troubleshoot and resolve the network
`problem in a timely manner. Also, the out-of-band manage
`ment connection providing connectivity to the console or
`management port of an element might be available for the
`initial configuration of the device whereas an in-band man
`agement connection might not be available for initial con
`figuration. It is also possible that some functions can only be
`performed using the console or management port of the
`element. An example of this would be Password Recovery
`on a Cisco router. While a dedicated and secure out-of-band
`network would be the most preferable solution for out-of
`band management from a security standpoint, the cost of
`such a solution is generally prohibitive. While some form of
`public shared network, such as the Public Switched Tele
`phone Network (PSTN) or an Integrated Services Digital
`Network (ISDN) provides the most cost effective solution
`for a diverse out-of-band connection, the security of Such
`Solutions is a major concern.
`The most straightforward means of providing out-of-band
`connectivity to a network element is to place a modem on
`the console port of a networking element connecting it to the
`PSTN. However, any perimeter security for the network
`Such as firewalls and access-lists has just been completely
`bypassed, providing a Vulnerable point for intruders to
`attack. If an attacker knows or can determine the phone
`number of the modem then the only security is the logon
`protection on the networking element itself. War dialers will
`generally find phone numbers connected to modems.
`It is important to realize that most protocols used for
`assisting in the remote management of network elements do
`not provide for the confidentiality or integrity of the infor
`mation being transmitted between the remote administrator
`
`30
`
`35
`
`40
`
`45
`
`In distributed computer networks the vast majority of the
`networking elements are not in the same geographic location
`or easily accessible by the skilled technicians or network
`administrators typically responsible for normal maintenance
`of the elements. Not only do these technicians and admin
`istrators require regular access to the network elements for
`maintenance, but they also need timely access to the network
`elements when problems arise in order to perform trouble
`shooting and resolving problems. The more quickly a net
`work administrator can access the elements in the network
`for troubleshooting the shorter the mean-time-to-repair
`(MTTR) an outage in the network.
`In general, it is not practical to require physical access to
`the systems for general maintenance or troubleshooting and
`repair. The costs would be prohibitive, both in time and
`personal, to require a skilled technician to be dispatched for
`every required activity on a system. This has driven a strong
`requirement to provide for remote management of network
`elements and servers. A number of means have been devel
`oped to provide for remote management of these systems.
`Remote management of the elements can be provided in
`band (the remote administrator communicates with the sys
`tem using the same network as the user data for the managed
`system) or out-of-band (the remote administrator commu
`50
`nicates with the system using a means other than the network
`utilized by the user data of the managed system). Typically,
`when out-of-band remote management is utilized, the
`administrator is connecting to a console or management port
`on the system.
`However, the security of the network elements and serv
`ers is a concern when remote management is allowed. For a
`system to be secure, it must first of all be physically secure
`from attack. Without physical security, it is almost certain an
`attacker can compromise a system. If management of the
`system requires physical access to the system then the
`security of the management is as strong as the physical
`security. But, as stated above, in most networks this is not
`practical. It is important, though, to realize that opening up
`a device to remote management allows a larger window for
`attackers to utilize in an attack. The use and security of
`remote management must be carefully considered.
`
`55
`
`60
`
`65
`
`Lenovo
`Ex. 1002 - Page 34
`
`

`

`3
`and the network element or strong authentication of the
`parties involved. This is especially critical if a public shared
`network such as the PSTN is utilized for the out-of-band
`connectivity. For instance, the protocol most frequently
`utilized for remote login to network elements (Telnet) trans
`mits traffic in the clear (any one who can tap into or sniff the
`network can capture and understand the traffic). It would not
`be uncommon for a remote administrator to be transmitting
`passwords and device configurations over Such a connec
`tion. If an attacker were able to insert himself in the middle
`of Such a connection, even more attacks would be possible.
`In order to control the cost of remote management solu
`tions, user traffic and management traffic are being com
`mingled at multiple locations throughout the management
`path. The use of the user data network for the transport of
`management traffic is one place this commingling of data
`occurs. There is also a commingling of user and manage
`ment data in the device itself. User traffic and device
`management traffic comes in over the same user interface,
`uses the same memory and buffers, and is processed by the
`same processor. The commingling of user traffic and man
`agement traffic can compromise the security of the device
`management.
`Maintenance and troubleshooting of network element
`problems can often be facilitated by having the element
`maintain an accurate time clock. One way of keeping the
`clock accurate on an element is to allow the network to set
`the clock utilizing a protocol such as Network Time Protocol
`(NTP). If an attacker were able to alter or interfere with NTP
`the smooth operation of the network could be interfered
`with.
`Some network elements utilize Hypertext Transfer Pro
`tocol (HTTP) or Hypertext Transfer Protocol over Secure
`Socket Layer (HTTPS) for managing the network element.
`HTTP transmits information in the clear and is susceptible
`to impersonation and data compromise. Often HTTPS is
`only authenticating the server to the client. For remote
`management, mutual authentication can be important.
`A common difficulty in maintaining the elements of a
`network is keeping the Software on the elements updated
`with patches that protect them from new exploits by hackers
`and crackers. One of the functions of firewalls is to protect
`the elements behind them from these exploits so that it is not
`as critical to keep protected elements updated. However, this
`does require the firewalls to be updated regularly to protect
`the elements from new exploits. Keeping the firewalls
`updated can be difficult.
`Some of these concerns can be addressed by technology
`existing today. A firewall/Virtual Private Network (VPN)
`appliance could be utilized to protect management traffic
`that flows from a user interface on the managed device to a
`central location providing services for the management of
`the device. This would protect the management data while it
`flows over the in-band network. A terminal server could be
`utilized to allow an administrator to dial into the managed
`device over an out-of-band network. Some terminal servers
`will even allow the connection from the administrator to the
`terminal server to be encrypted for protection of the man
`agement data. However, this does not solve all the concerns.
`60
`The terminal server does not fully support a centralized
`mechanism to verify an administrator should have access to
`the managed device, especially if the in-band network is
`down. The VPN/Firewall does not support connection to the
`console port of the managed device. Even having both a
`VPN/Firewall and a terminal server would leave gaps in the
`protection.
`
`45
`
`35
`
`40
`
`50
`
`55
`
`65
`
`US 7,325,140 B2
`
`5
`
`10
`
`15
`
`25
`
`4
`It would take a number of different devices configured to
`work together to address most of the concerns. This would
`require a number of additional devices in an environment
`where rack space is very expensive. Having another two or
`three devices in the rack is quite expensive in more ways
`than just the cost of the equipment.
`An object of the invention is to provide for the secure
`management of devices without requiring additional devices
`taking up additional rack space by embedding the necessary
`hardware and Software for secure management of the device
`in the device to be managed.
`Another object of the invention is to separate user traffic
`from device management traffic, logically and/or physically,
`both in the device and while in transit over a network.
`Another object of the invention is to establish a network
`enabled management interface for the secure remote man
`agement of the device. While similar to a console interface,
`the secure interface is to be engineered to secure remote
`aCCCSS,
`Another object of the invention is to define a virtual
`management interface for controlling management traffic
`that will flow over the in-band interfaces. The virtual man
`agement interface provides for logical separation of the
`management data from the user data even when the man
`agement data and the user data will transit the same physical
`network.
`Another object of the invention is to utilize standard
`packet filtering firewall methods to restrict access to the
`management interfaces of the device, both real and virtual,
`based on factors such as the source address of the connection
`request.
`Another object of the invention is to use a means of
`authentication, including the possibility of strong authenti
`cation, to verify the identity of the administrator and restrict
`access to the management interfaces based on the identity of
`the administrator.
`Another object of the invention is to use an Access
`Control Server (ACS) to allow for centralized authentication
`and authorization of administrators as well as to log account
`ing information.
`Another object of the invention is to restrict functions and
`protocols allowed to access the management interfaces to
`those necessary for remote management of that network
`element.
`Another object of the invention is to dynamically update
`the rules used for restricting access to the management
`interfaces.
`Another object of the invention is to provide for the
`confidentiality and integrity of the information transmitted
`between the remote administrator and the management
`interfaces.
`Another object of the invention is to monitor the man
`agement interfaces for proper functioning and alert manage
`ment Software upon failure.
`Another object of the invention is to monitor management
`interfaces for possible attacks and report possible attacks to
`Intrusion Detection System management Software.
`Another object of the invention is to provide for secure
`connections to a network providing network services both
`utilizing the managed device's user data connections and
`over a dedicated secure network enabled management con
`nection.
`Another object of the invention is to access network
`services such as ACS, Domain Name Server (DNS), NTP
`Network Management Stations, Logging Servers, and Intru
`sion Detection Systems management stations over either an
`in-band network connection or over the network enabled
`
`Lenovo
`Ex. 1002 - Page 35
`
`

`

`US 7,325,140 B2
`
`10
`
`15
`
`5
`management connection (or both) and dynamically Switch
`between which network is being utilized for the service.
`Another object of the invention is to allow a remote
`administrator or technician to access the management inter
`faces via either an in-band connection or a network enabled
`management connection (or both).
`Yet another object of the invention is to provide auditing
`information about attempted connections (successful and
`unsuccessful) to the management interfaces.
`Yet another object of the invention is to alert management
`Software on unsuccessful attempts to connect to manage
`ment interfaces.
`Yet another object of the invention is to be able to securely
`manage the device through in-band connections to the
`virtual management interface, the network enabled manage
`ment connection, or the console port.
`A further object of the invention is to enable securing a
`plurality of management protocols for managing the device,
`both over in-band connections to the virtual management
`interface and over the secure network enabled management
`connection. Exemplary protocols to be secured include
`telnet, Ssh, http, https, Snmp, dins, t?tp, ftp, intp, and Xml.
`A further object of the invention is to provide the end
`point for an in-band or out-of-band connection between the
`network segments providing network services and the man
`25
`agement interfaces on the managed devices which can be
`secured using protocols such as IPSec or may be unsecured.
`A further object of the invention is to provide the ability
`for the managed device to Switch which management path is
`being utilized for management network services, in particu
`lar, the managed device can utilize in-band connections for
`management network services when available and Switch to
`using a network enabled management connection for man
`agement network services when an inband connection is not
`available.
`A further objective of the invention is to enable the secure
`management of other devices that are collocated with the
`managed device.
`A further objective of the invention is to provide for the
`ability to easily upgrade existing hardware to Support secure
`management of the device.
`Finally, it is an object of the present invention to accom
`plish the foregoing objectives in a simple and cost effective
`a.
`
`6
`to manage the device. The administrator will be able to
`connect to the SMACC card through the Virtual Manage
`ment Interface (VMI) or directly through a SMACC inter
`face on the SMACC card.
`A primary function of the SMACC is to provide for the
`separation of management data from user data both within
`the device being managed and while the management infor
`mation is in transit. Within the device, the SMACC sets up
`a separate processor for receiving management information
`and interacting with the control functions of the device.
`Remote management functions will pass through the
`SMACC processor. The SMACC also provides for a sepa
`rate interface for management functions that is network
`enabled to facilitate remote management. Various embodi
`ments of the invention allow for different types of interfaces
`to be utilized for the network enabled management inter
`faces. Exemplary interfaces could include POTS connec
`tions to the PSTN, Packet Cellular connections to a cellular
`provider's infrastructure, an Ethernet interface to a broad
`band modem and the Internet, or a wireless connection. The
`types of interfaces are not limited to those in this list to be
`within the scope of this invention. AVMI is also established
`for logically separating management traffic from user data
`when the in-band path is to be used for management data.
`The VMI is the interface between the SMACC chipset and
`the user data interfaces. The VMI utilizes existing and
`developing technology such as VPN to build secure tunnels
`between the SMACC chipset and the management center
`while utilizing the user data interfaces of the managed
`device and the user network to provide the transport of the
`management data cost effectively. The VPN technology
`provides the logical separation, confidentiality, and integrity
`of the management traffic while it is in transit.
`Another primary function of the SMACC is to protect the
`management interfaces from attack. This is accomplished
`through a combination of firewall, VPN, and authentication
`and authorization applications. The SMACC chipset imple
`ments the logic to Support VPN tunnels to the management
`center, thus protecting the management traffic between the
`management interface on the SMACC (VMI or SMACC
`interface) and the management center. The firewall func
`tionality protects the SMACC chipset from access by unau
`thorized parties, both internal and external, and from unau
`thorized protocols. An exemplary embodiment of the
`SMACC can be configured to only allow the protocols
`necessary for managing the device to access the SMACC.
`No other protocols will be allowed through the interface.
`The authentication and authorization of administrators can
`either be configured and accomplished locally to the
`SMACC, and/or centralized services can be accessed at the
`management center utilizing the secure management inter
`faces to the management center (VMI or SMACC interface).
`The SMACC implements the client protocol for exemplary
`services such a Remote Authentication Dial-In User Service
`(RADIUS) protocol, Terminal Access Controller Access
`Control System (TACACS+), or Lightweight Directory
`Access Protocol (LDAP).
`The SMACC allows the use of shared networks including
`public networks such as the Internet, the Public Switched
`Telephone Network (PSTN), or a corporate backbone net
`work for secure network management while still providing
`for the confidentiality, integrity, and logical separation of the
`management data. In an exemplary embodiment, this is
`accomplished by utilizing Virtual Private Networking
`(VPN) technology to build secure tunnels between one or
`more management interface on the SMACC and the man
`agement center providing network resources for manage
`
`30
`
`35
`
`40
`
`SUMMARY OF THE INVENTION
`
`45
`
`The present invention addresses the foregoing problems,
`as well as other problems, by providing an exemplary
`embodiment of a Secure Management Access Control for
`Computer Chipset (SMACC) for inclusion in devices that
`are to be enabled for remote management. In this preferred
`exemplary embodiment, the SMACC functions are imple
`mented on a separate processor with separate flash and
`memory; however, this is not intended to limit the imple
`mentation of these features to separate chipsets in a device.
`These features also can be combined with other hardware
`and Software features such as being integrated with a modem
`or with the main processor of a device. Some of the features
`of the SMACC can also be implemented separately. Such
`implementations would still be within the spirit and scope of
`this invention.
`An additional exemplary embodiment of the invention
`implements the SMACC processor and Supporting chips on
`a card that can be inserted into the device to be managed. In
`this implementation, management of the device is controlled
`by the card and the administrator must connect to the card
`
`50
`
`55
`
`60
`
`65
`
`Lenovo
`Ex. 1002 - Page 36
`
`

`

`US 7,325,140 B2
`
`10
`
`15
`
`25
`
`35
`
`7
`ment. The VPN tunnels provide for logical separation of the
`management traffic from any other traffic utilizing the net
`work. The VPN tunnels also utilize encryption to provide for
`the confidentiality and integrity of the management traffic
`utilizing the network. SMACC increases both the security
`and the availability of remote management of devices.
`The SMACC allows for access controls both on what
`remote devices can connect to the management interfaces of
`the SMACC (and can th

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket