Network sniffer for monitoring and reporting network information that is not privileged beyond a user's privilege level
First Claim
1. A method for locating available information in a network environment by a user at a node in the network, the method comprising the steps of:
- a) accessing the network sniffer that is monitoring data sent to the node;
b) determining if the data being monitored by the network sniffer is privileged; and
c) accessing data which is not privileged beyond the user'"'"'s privileged level.
1 Assignment
0 Petitions
Accused Products
Abstract
The present invention provides a method and system for locating available information in a network environment by a user in a node. In a system aspect, within a node in the network, the present invention includes a network sniffer and an access sniffer. The access sniffer includes an access element and an access interface. The access element preferably includes a memory and a database. The access element accesses the network sniffer and filters out unavailable information by using information such as address and port numbers gathered by the network sniffer. Unavailable information includes information which is non-public or beyond the privilege level of the particular user. The access element evaluates data streams which are public information to determine if the data streams meet a predetermined criteria. If the data streams meet the predetermined criteria, then the data is saved in the database. The access element transfers only the information available to the particular user to the access interface. The access element can time itself for a limited amount of time for execution. Once the predetermined time period has expired, the access element is complete and it can save and transfer the appropriate information to the access interface.
122 Citations
19 Claims
-
1. A method for locating available information in a network environment by a user at a node in the network, the method comprising the steps of:
-
a) accessing the network sniffer that is monitoring data sent to the node; b) determining if the data being monitored by the network sniffer is privileged; and c) accessing data which is not privileged beyond the user'"'"'s privileged level.
-
-
2. A method for locating at a node requested data from among data sent to the node in a network environment, the requested data being located for providing access thereto by a user at the node, the method comprising the steps of:
-
a) accessing a network sniffer that is monitoring the data sent to the node; b) determining if the data being monitored by the network sniffer is privileged or public; c) determining if the data being monitored includes the available information if the data is privileged, wherein a privilege level of the available information is at or below a privilege level of the user; d) locating addresses and port numbers of the available information, wherein the available information from among the data being monitored includes the data which is public; e) reporting the available information including the corresponding addresses and port numbers; and f) providing access to the available information, wherein the available information includes the requested data and wherein the requested data is not privileged beyond the user'"'"'s privilege level. - View Dependent Claims (3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A system for locating available information in the network environment by a user in a node, the system comprising:
-
means for monitoring data which is sent to the node; and means coupled to the monitoring means for accessing the data, wherein the accessing means determines if the data being monitored by the monitoring means is privileged beyond the user'"'"'s privilege level, and wherein the accessing means reports the data which is not privileged beyond the user'"'"'s privilege level and, with the data, the accessing means reports addresses and port numbers corresponding thereto. - View Dependent Claims (13, 14)
-
-
15. A system for locating available information in the network environment by user data node, the system comprising:
-
a first sniffer for monitoring data which is sent to a node; and a second sniffer coupled to the first sniffer for accessing the data which is being monitored by the first sniffer, wherein the second sniffer determines if the data being monitored is privileged beyond the user'"'"'s privilege level, and wherein the accessing means reports the data which is not privileged beyond the user'"'"'s privilege level and, with the data, the accessing means reports addresses and port numbers corresponding thereto. - View Dependent Claims (16, 17)
-
-
18. A system for locating available information in a network environment by a user edit node, the system comprising:
-
accessing means for accessing data which is being monitored by a monitoring means, wherein the accessing means determines is the data being monitored is privileged beyond the user'"'"'s privilege level, and wherein the accessing means reports the data which is not privileged beyond the user'"'"'s privileged level and, with the data, the accessing means reports addresses and port numbers corresponding thereto; and interface means coupled to the accessing means for transferring accessed data which is not beyond the user'"'"'s privilege level.
-
-
19. A computer readable medium containing program instructions for locating at a node requesting data from among data sent to the node in and network environment, the requested data being located for providing access thereto by a user at a node, the program instructions for:
-
a) accessing the networks never that is monitoring the data sent to the node; b) determining if the data being monitored by the network sniffers is privileged or public; c) determining if it data being monitored includes the available information if the data is privileged, wherein a privilege level of the available information is at or below a privilege level of the user; d) locating addresses and port numbers of the available information wherein the available information from among the data being monitored includes the data which is public; e) reporting the available information including the corresponding addresses and port numbers; and f) providing access to the available information, wherein the available information includes the requested data and wherein the requested data is not privileged beyond the user'"'"'s privilege level.
-
Specification