Unix file and process mapping
First Claim
Patent Images
1. A method for generating UNIX-based fingerprints, the method comprising:
- identifying a credential level associated with a customer, wherein the identified credential level is associated with a degree of access that the customer has to a UNIX-based environment;
retrieving a set of attributes associated with a UNIX-based object based on the degree of access associated with the identified credential level, wherein the retrieved set of attributes correspond to a unique set of processes of the UNIX-based object, and wherein a different set of attributes is retrieved for a different credential level associated with a different degree of access to the UNIX-based environment;
generating rules for identifying the UNIX-based object at the identified credential level based on the set of retrieved attributes, wherein different rules for identifying the same UNIX-based object are generated for the different credential level based on the different set of attributes; and
generating a script based on the generated rules and the different rules, wherein the generated script is executable by an application that is used to search for the same UNIX-based object within the UNIX-based environment in accordance with the identified credential level for the customer and at the different credential level.
4 Assignments
0 Petitions
Accused Products
Abstract
Each known operating system, software, or hardware within a UNIX environment can correspond to a list of identifiable attributes that is used to uniquely identify the operating system, software, or hardware of interest. By using these identifiable attributes in rules, fingerprints can be generated that define the existence of an object (e.g. operating systems, software and hardware) within the UNIX environment. By using the generated fingerprints via a discovery tool, the existence of the objects can be determined within the UNIX environment (e.g. computing device, computing network).
-
Citations
12 Claims
-
1. A method for generating UNIX-based fingerprints, the method comprising:
-
identifying a credential level associated with a customer, wherein the identified credential level is associated with a degree of access that the customer has to a UNIX-based environment; retrieving a set of attributes associated with a UNIX-based object based on the degree of access associated with the identified credential level, wherein the retrieved set of attributes correspond to a unique set of processes of the UNIX-based object, and wherein a different set of attributes is retrieved for a different credential level associated with a different degree of access to the UNIX-based environment; generating rules for identifying the UNIX-based object at the identified credential level based on the set of retrieved attributes, wherein different rules for identifying the same UNIX-based object are generated for the different credential level based on the different set of attributes; and generating a script based on the generated rules and the different rules, wherein the generated script is executable by an application that is used to search for the same UNIX-based object within the UNIX-based environment in accordance with the identified credential level for the customer and at the different credential level. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system for generating UNIX-based fingerprints, the system comprising:
-
one or more computing devices associated with a UNIX-based environment; and a server that includes memory that has instructions executed by a processor to; identify a credential level associated with a customer, wherein the identified credential level is associated with a degree of access that the customer has to the UNIX-based environment retrieve a set of attributes associated with a UNIX-based object based on the degree of access associated with the identified credential level, wherein the retrieved set of attributes correspond to a unique set of processes of the UNIX-based object, and wherein a different set of attributes is retrieved for a different credential level associated with a different degree of access to the UNIX-based environment; generate rules for identifying the UNIX-based object at the identified credential level based on the set of retrieved attributes, wherein different rules for identifying the same UNIX-based object are generated for the different credential level based on the different set of attributes; and generate a script based on the generated rules and the different rules, wherein the generated script is executable by an application that is used to search for the same UNIX-based object within the UNIX-based environment in accordance with the identified credential level for the customer and at the different credential level.
-
-
12. A non-transitory computer-readable storage medium having embodied thereon a program, the program being executable by a processor to perform a method for generating UNIX-based fingerprints, the method comprising:
-
identifying a credential level associated with a customer, wherein the identified credential level is associated with a degree of access that the customer has to a UNIX-based environment; retrieving a set of attributes associated with a UNIX-based object based on the degree of access associated with the identified credential level, wherein the retrieved set of attributes correspond to a unique set of processes of the UNIX-based object, and wherein a different set of attributes is retrieved for a different credential level associated with a different degree of access to the UNIX-based environment; generating rules for identifying the UNIX-based object at the identified credential level based on the set of retrieved attributes, wherein different rules for identifying the same UNIX-based object are generated for the different credential level based on the different set of attributes; and generating a script based on the generated rules and the different rules, wherein the generated script is executable by an application that is used to search for the same UNIX-based object within the UNIX-based environment in accordance with the identified credential level for the customer and at the different credential level.
-
Specification