Network management
First Claim
Patent Images
1. A method of administering a network of computing entities comprising the steps of:
- probing an entity for vulnerabilities and generating a log of the or each vulnerability against the network address of the entity;
in response to a query from the entity, retrieving from the log, vulnerabilities of the entity; and
receiving from the entity, data identifying its associated user.
2 Assignments
0 Petitions
Accused Products
Abstract
A method of operating a computing entity in a network having a log mapping computing entity network addresses to vulnerabilities, the method comprising the steps of: using the entity'"'"'s network address, searching the log to establish what vulnerabilities the entity has; and if the log indicates the entity has a vulnerability, sending data identifying a user of the entity to an administrator of the network.
63 Citations
14 Claims
-
1. A method of administering a network of computing entities comprising the steps of:
-
probing an entity for vulnerabilities and generating a log of the or each vulnerability against the network address of the entity;
in response to a query from the entity, retrieving from the log, vulnerabilities of the entity; and
receiving from the entity, data identifying its associated user. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method of operating a computing entity in a network having a log mapping computing entity network addresses to vulnerabilities, the method comprising the steps of:
-
using the entity'"'"'s network address, searching the log to establish what vulnerabilities the entity has; and
if the log indicates the entity has a vulnerability, sending data identifying a user of the entity to an administrator of the network. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A computer program product for use on a computing entity within a network having a log mapping computing entity network addresses to vulnerabilities, the program being adapted to:
-
using the entity'"'"'s network address, search the log to establish what vulnerabilities the entity has; and
if the log indicates the entity has a vulnerability, send data identifying a user of the entity to an administrator of the network.
-
Specification