Classification of objects
First Claim
Patent Images
1. A method for generating fingerprints, the method comprising:
- receiving a plurality of identifiable attributes unique to an object from a discovery agent, wherein the plurality of identifiable attributes corresponds to a credential level, wherein the credential level indicates a level of access associated with a network environment in which the identifiable attributes are discoverable, and wherein the object is further associated with a different plurality of identifiable attributes corresponding to a different credential level;
generating rules for identifying the plurality of identifiable attributes in the network environment based on the corresponding credential level, wherein the generated rules are executable to identify the object within the network environment; and
generating a script based on the generated rules, wherein the generated script is executable by the discovery agent to search for the plurality of identifiable attributes associated with the object within the searched environment in accordance with the corresponding credential level.
4 Assignments
0 Petitions
Accused Products
Abstract
Each known operating system, software, or hardware can correspond to a list of identifiable attributes that is used to uniquely identify the operating system, software, or hardware of interest. By using these identifiable attributes in rules, fingerprints can be generated that define the existence of an object (e.g. operating systems, software and hardware). By using the generated fingerprints via a discovery tool, the existence of the objects can be determined within an environment (e.g. computing device, computing network).
-
Citations
17 Claims
-
1. A method for generating fingerprints, the method comprising:
-
receiving a plurality of identifiable attributes unique to an object from a discovery agent, wherein the plurality of identifiable attributes corresponds to a credential level, wherein the credential level indicates a level of access associated with a network environment in which the identifiable attributes are discoverable, and wherein the object is further associated with a different plurality of identifiable attributes corresponding to a different credential level; generating rules for identifying the plurality of identifiable attributes in the network environment based on the corresponding credential level, wherein the generated rules are executable to identify the object within the network environment; and generating a script based on the generated rules, wherein the generated script is executable by the discovery agent to search for the plurality of identifiable attributes associated with the object within the searched environment in accordance with the corresponding credential level. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A system for generating fingerprints, the system comprising:
-
one or more computing devices associated with a network environment, wherein each computing device has installed one or more objects; and a server that has instructions stored in memory, the instructions being executed by a processor to; receive a plurality of identifiable attributes unique to an object from a discovery agent, wherein the plurality of identifiable attributes correspond to a credential level, wherein the credential level indicates a level of access associated with the network environment in which the identifiable attributes are discoverable, and wherein the object is further associated with a different plurality of identifiable attributes corresponding to a different credential level; generate rules for identifying the received plurality of identifiable attributes in the network environment based on the corresponding credential level, wherein the generated rules are executable to identify the object within the network environment; and generate a script based on the generated rules, wherein the generated script is executable by the discovery agent to search for the plurality of identifiable attributes associated with the object within the search environment in accordance with the corresponding credential level.
-
-
17. A non-transitory computer-readable storage medium having embodied thereon a program, the program being executable by a processor to perform a method for generating fingerprints, the method comprising:
-
receiving a plurality of identifiable attributes unique to an object from a discovery agent, wherein the plurality of identifiable attributes corresponds to a credential level, wherein the credential level indicates a level of access associated with a network environment in which the identifiable attributes are discoverable, and wherein the object is further associated with a different plurality of identifiable attributes corresponding to a different credential level; generating rules for identifying the received plurality of identifiable attributes in the network environment based on the corresponding credential level, wherein the generated rules are executable to identify the object within the network environment; and generating a script based on the generated rules, wherein the generated script is executable by the discovery agent to search for the plurality of identifiable attributes associated with the object within the searched environment in accordance with the corresponding;
credential level.
-
Specification