Method and system for monitoring and manipulating the flow of private information on public networks
First Claim
1. A computer-implemented method for securely monitoring concurrent flows of information on a public network of computers, each of a plurality of users having on the public network a flow of private information originating from a private source computer of the user and arriving at a private destination computer of the user, the method comprising the steps of:
- identifying the private source computer and the private destination computer for each of the plurality of users;
retrieving network status information for the public network that includes a current status of each of the public network computers;
gathering information about private information flows on the public network by repeatedly,receiving network status information for the public network that includes a current status of each of the public network computers;
receiving network operation information for the public network that includes data about information traveling from source computers through the public network to destination computers; and
for each user,analyzing the received network operation information to identify the received data about information whose source or destination computer is the private source computer or the private destination computer of the user; and
storing the identified data in a storage location specific to the user; and
sending to each user recently received network status information and recently stored identified data from the storage location specific to the user.
3 Assignments
0 Petitions
Accused Products
Abstract
A Mid-Level Manager (MLM) network information management system monitors and manipulates the flow of private information on public networks. The MLM system begins by retrieving and storing information about subscribers to the public networks. The MLM also queries the computers of the public networks to obtain information about network configuration and status. Upon receiving network information, the MLM system uses the stored subscriber information to analyze the network information and to determine the subscribers to which the network information pertains. If network information pertains to a subscriber and the subscriber is authorized to receive that information, the MLM systems adds that network information to a subscriber-specific data storage location. In addition, network status information of interest to administrators of the public network is stored in a separate data storage location. The MLM system supplies the subscriber-specific network information to subscribers to allow them to monitor their networks in a real-time manner, ensuring that a subscriber receives only that information for which they are authorized and that only authorized parties will receive a subscriber'"'"'s private data. The MLM system also provides the current network status information to public network administrators. Subscribers are also allowed to manipulate their flow of information, such as by changing the bandwidth on a PVC, in a real-time manner. The MLM system handles requests from subscribers to modify their levels of MLM service or their levels of service provider'"'"'s public network service, and takes appropriate action to effect the change.
214 Citations
8 Claims
-
1. A computer-implemented method for securely monitoring concurrent flows of information on a public network of computers, each of a plurality of users having on the public network a flow of private information originating from a private source computer of the user and arriving at a private destination computer of the user, the method comprising the steps of:
-
identifying the private source computer and the private destination computer for each of the plurality of users; retrieving network status information for the public network that includes a current status of each of the public network computers; gathering information about private information flows on the public network by repeatedly, receiving network status information for the public network that includes a current status of each of the public network computers; receiving network operation information for the public network that includes data about information traveling from source computers through the public network to destination computers; and for each user, analyzing the received network operation information to identify the received data about information whose source or destination computer is the private source computer or the private destination computer of the user; and storing the identified data in a storage location specific to the user; and sending to each user recently received network status information and recently stored identified data from the storage location specific to the user. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A computer-readable medium containing instructions for controlling a computer system to securely monitor concurrent flows of information on a public network of computers, each of a plurality of users having on the public network a flow of private information originating from a private source computer of the user and arriving at a private destination computer of the user, the monitoring such that each user can monitor only the flow of private information for the user, by:
-
identifying the private source computer and the private destination computer for each of the plurality of users; retrieving network status information for the public network that includes a current status of each of the public network computers; gathering information about private information flows on the public network by repeatedly, receiving network status information for the public network that includes a current status of each of the public network computers; receiving network operation information for the public network that includes summaries about information traveling from source computers through the public network to destination computers; and for each user, analyzing the received network operation information to identify the summaries about information whose source or destination computer is the private source computer or the private destination computer of the user; and storing the identified summaries in a storage location specific to the user; and sending to each user recently received network status information and recently stored identified summaries from the storage location specific to the user.
-
-
8. A computer system for securely monitoring concurrent flows of information on a public network of computers, each of a plurality of users having on the public network a flow of private information originating from a private source computer of the user and arriving at a private destination computer of the user, the monitoring such that each user can monitor only the flow of private information for the user, comprising:
-
an initializer for identifying the private source computer and the private destination computer for each of the plurality of users; a network information poller for gathering information about private information flows on the public network by repeatedly receiving network status information for the public network that includes a current status of each of the public network computers, by repeatedly receiving network operation information for the public network that includes summaries about information traveling from source computers through the public network to destination computers, and by repeatedly analyzing the received network operation information for each user to identify the summaries about information whose source or destination computer is the private source computer or the private destination computer of the user; and a network information repository for storing the identified private source computer and the identified private destination computer for each of the plurality of users, and for storing the identified summaries for each user in a storage location specific to the user.
-
Specification