Methods, communication networks, and computer program products for storing and/or logging traffic associated with a network element based on whether the network element can be trusted
First Claim
Patent Images
1. A method of operating a communication network, comprising:
- determining whether a network element can be trusted; and
storing and/or logging traffic associated with the network element based on whether the network element can be trusted.
1 Assignment
0 Petitions
Accused Products
Abstract
A determination can be made whether a network element is configured in an authorized manner, e.g., whether the network element is configured with authorized firmware, software, and/or data. In this regard, a determination is made whether the network element can be trusted and to what degree the network element can be trusted. Based on this determination of whether the network element can be trusted, the traffic associated with the network element can be stored and/or logged in a desired manner.
25 Citations
20 Claims
-
1. A method of operating a communication network, comprising:
-
determining whether a network element can be trusted; and
storing and/or logging traffic associated with the network element based on whether the network element can be trusted. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A communication network, comprising:
-
a verification system that is configured to determine whether a network element can be trusted; and
a storing/logging controller that is connected to the verification system and is configured to store and/or log traffic associated with the network element based on whether the network element can be trusted. - View Dependent Claims (17, 18, 19, 20)
-
Specification