Method and system for communicating data to and from network security devices
First Claim
1. A method for transmitting data from a computer network security device for monitoring at least one computer network node to an operations center for monitoring at least said computer network security device and to said computer network security device from said operations center in a managed computer network security system including at least said computer network security device and operations center, said method comprising:
- establishing security information associated with said at least one computer network security device;
using said established security information to authenticate data transmissions from said computer network security device to said operations center; and
, using said established security information to authenticate data transmission to said computer network security device from said operations center.
2 Assignments
0 Petitions
Accused Products
Abstract
A method and system for transmitting data from a computer network security device for monitoring at least one computer network node to an operations center for monitoring at least the computer network security device and to the computer network security device from the operations center in a managed computer network security system including at least the computer network security device and operations center, including establishing security information associated with the at least one computer network security device. The established security information is used to authenticate data transmissions from the computer network security device to the operations center. The established security information is used to authenticate data transmission to the computer network security device from the operations center.
63 Citations
35 Claims
-
1. A method for transmitting data from a computer network security device for monitoring at least one computer network node to an operations center for monitoring at least said computer network security device and to said computer network security device from said operations center in a managed computer network security system including at least said computer network security device and operations center, said method comprising:
-
establishing security information associated with said at least one computer network security device;
using said established security information to authenticate data transmissions from said computer network security device to said operations center; and
,using said established security information to authenticate data transmission to said computer network security device from said operations center. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32)
-
-
33. A computer program product embodied on one or more computer-readable storage mediums and for transmitting data from a computer network security device for monitoring at least one computer network node to an operations center for monitoring at least said computer network security device and to said computer network security device from said operations center in a managed computer network security system including at least said computer network security device and operations center, the computer program product comprising:
-
code for establishing security information associated with said at least one computer network security device;
code for using said established security information to authenticate data transmissions from said computer network security device to said operations center; and
,code for using said established security information to authenticate data transmission to said computer network security device from said operations center.
-
-
34. A computer network security device for monitoring at least one computer network node and transmitting data to an operations center for monitoring at least said computer network security device and receiving data from said operations center in a managed computer network security system including at least said computer network security device and operations center, said device comprising:
-
code for transmitting security information associated with said at least one computer network security device to said operations center;
code for using said established security information to authenticate data transmissions from said computer network security device to said operations center; and
,code for using said established security information to authenticate data transmission to said computer network security device from said operations center.
-
-
35. An operations center for monitoring at least one network security device in a managed computer network security system including at least said computer network security device and operations center, said center comprising:
-
code for receiving security information associated with said at least one computer network security device from said network security device;
code for using said established security information to authenticate data transmissions from said computer network security device to said operations center; and
,code for using said established security information to authenticate data transmission to said computer network security device from said operations center.
-
Specification