Managing network components using USB keys
First Claim
1. A network management apparatus comprising:
- a first storage device containing public key data relating to a network, the data including root certificate authority data and a plurality of IP addresses; and
a second storage device containing network data and instructional scripts guiding certain operations of a network component when the second storage device is inserted into the network component, wherein the network data and the instructional scripts on the second storage device are signed using the public key data stored on the first storage device.
2 Assignments
0 Petitions
Accused Products
Abstract
Devices and methods for managing a communications network include using USB keys to provision and management components in the network by having the network component establish a connection to a network administrator device, such as a laptop, PDA, or desktop workstation. A first USB key is used to provision a network component so that it has the necessary security information to interact with a second USB key, used to enable actual management of the component. Once the component has the security information, the second USB key is inserted and certain callback data are made available to the component. It uses this data to make a “call” or connection to an administrator'"'"'s device. The callback data may be an IP address of the device, an e-mail address, VoIP data, instant messaging data, dial-up data, and so on. Once the connection, initiated and established by the network component, is made the administrator can begin managing the component.
-
Citations
25 Claims
-
1. A network management apparatus comprising:
-
a first storage device containing public key data relating to a network, the data including root certificate authority data and a plurality of IP addresses; and a second storage device containing network data and instructional scripts guiding certain operations of a network component when the second storage device is inserted into the network component, wherein the network data and the instructional scripts on the second storage device are signed using the public key data stored on the first storage device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 24)
-
-
14. A method of managing a network comprising:
-
storing public-key information relating to a network onto a first portable storage device; storing network data and scripts onto a second portable storage device; provisioning a network component by using the first storage device; managing the network component using the second storage device and an administration component, wherein the network component initiates and establishes a connection with the administration component; and disconnecting with the administration component by discontinuing use of the second storage device. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22, 23)
-
-
25. A method of managing components in a network comprising:
-
inserting a first USB key into a network component to authenticate a technician device to the network component; establishing a connection between the component and the device using the first USB key, wherein the network component initiates the connection with the device; inserting a second USB key into the network component; retrieving network component data for the purpose of managing the network component; and managing the network component using the second USB key.
-
Specification