Generating and analyzing network profile data
First Claim
Patent Images
1. An apparatus, comprising:
- a memory configured to store network profile data;
a processing device, operatively coupled with the memory, configured to;
determine whether the network profile data has been transmitted to a network apparatus to prevent a duplicate of the network profile data from being transmitted to the network apparatus;
in response to determining that the network profile data has not been transmitted to the network apparatus, obtain the network profile data, wherein the network profile data comprises a set of network parameters detected by the apparatus comprising a list of incoming or outgoing connection requests from the apparatus and wherein the network profile data provides an indication of whether the apparatus is compromised;
encrypt the network profile data to generate hashed network profile data;
identify a stream of packets addressed to the network apparatus;
insert a packet comprising the hashed network profile data into the stream of packets addressed to the network apparatus; and
transmit the stream of packets comprising the packet to the network apparatus for determination of whether the apparatus is compromised by comparing the hashed network profile data with previous network profile data received from the apparatus without decrypting the encrypted network profile data.
3 Assignments
0 Petitions
Accused Products
Abstract
A device may generate network profile data indicating a set of network parameters detected by the device. The device may encrypt the network profile data and may transmit the encrypted network profile data to a network device, such as a router, or a server. The router or server may analyze the encrypted network profile data to determine if the device is secure. The router of server may perform one or more security measures if the device is not secure.
73 Citations
11 Claims
-
1. An apparatus, comprising:
-
a memory configured to store network profile data; a processing device, operatively coupled with the memory, configured to; determine whether the network profile data has been transmitted to a network apparatus to prevent a duplicate of the network profile data from being transmitted to the network apparatus; in response to determining that the network profile data has not been transmitted to the network apparatus, obtain the network profile data, wherein the network profile data comprises a set of network parameters detected by the apparatus comprising a list of incoming or outgoing connection requests from the apparatus and wherein the network profile data provides an indication of whether the apparatus is compromised; encrypt the network profile data to generate hashed network profile data; identify a stream of packets addressed to the network apparatus; insert a packet comprising the hashed network profile data into the stream of packets addressed to the network apparatus; and transmit the stream of packets comprising the packet to the network apparatus for determination of whether the apparatus is compromised by comparing the hashed network profile data with previous network profile data received from the apparatus without decrypting the encrypted network profile data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 11)
-
-
9. A method, comprising:
-
determine whether network profile data stored in an apparatus has been transmitted to a network apparatus to prevent a duplicate of the network profile data from being transmitted to the network apparatus; in response to determining that the network profile data has not been transmitted to the network apparatus, obtaining the network profile data, wherein the network profile data comprises a set of network parameters detected by the apparatus comprising a list of incoming or outgoing connections requests from the apparatus and wherein the network profile data provides an indication of whether the apparatus is compromised; encrypting the network profile data to generate hashed network profile data; identifying a stream of packets addressed to the network apparatus; inserting a packet comprising the hashed network profile data into the stream of packets addressed to the network apparatus; and transmitting the hashed network profile data to the network apparatus in the stream of packets for determination of whether the apparatus is compromised by comparing the hashed network profile data with previous network profile data received from the apparatus without decrypting the encrypted network profile data. - View Dependent Claims (10)
-
Specification