EXTRACTING INFORMATION IN A COMPUTER SYSTEM
First Claim
Patent Images
1. A method in a computer system, comprising:
- obtaining by a management system log data for at least one host; and
extracting, by the management system from the log data, information for a login event, said information comprising information of at least an originating host device network address, a destination host device network address, and information of a key fingerprint.
1 Assignment
0 Petitions
Accused Products
Abstract
Certain embodiments provide means for managing automated access to computers, e.g., using SSII user keys and other kinds of trust relationships. Certain embodiments also provide for managing certificates, Kerberos credentials, and cryptographic keys. Certain embodiments provide for remediating legacy SSH key problems and for automating configuration of SSH keys, as well as for continuous monitoring.
-
Citations
22 Claims
-
1. A method in a computer system, comprising:
-
obtaining by a management system log data for at least one host; and extracting, by the management system from the log data, information for a login event, said information comprising information of at least an originating host device network address, a destination host device network address, and information of a key fingerprint. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. An apparatus for a management system in a computer system, the apparatus comprising at least one processor, and at least one memory for storing instructions that, when executed, cause the apparatus to
obtain log data for at least one host; - and
extract, from the log data, information for a login event, said information comprising information of at least an originating host device network address, a destination host device network address, and information of a key fingerprint. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20, 21)
- and
-
22. A non-transitory computer readable media comprising program code for causing a processor of a management system to perform instructions in a computer system, the method performed comprising:
-
obtaining log data for at least one host; and extracting, from the log data, information for a login event, the information comprising information of at least an originating host device network address, a destination host device network address, and information of a key fingerprint.
-
Specification