Apparatus, methods and articles of manufacture for securing computer networks
First Claim
Patent Images
1. A method for securing, maintaining, monitoring and controlling computer networks and clients located therein, comprising:
- providing a hash code table of a client said hash code table being provided for storing a plurality of files;
providing a client state code of a client;
comparing said client state code to said hash code table, and generating an alert mechanism when a deviation threshold is reached based on a deviation between said hash code table values for said client and said client state code;
wherein said hash code table includes the hash codes for files on computers within the network that are to be secured;
the method further including;
transmitting across a network from clients located in the network a client state code;
providing at least one server within the network assigned to recognize said client state code transmission,wherein said server maintains a baseline for said client, andwherein said baseline comprises said hash code table of a said client;
wherein the step of providing a hash code table of a network device further comprises providing a secure hash code table;
wherein the step of providing a secure hash code table further comprises generating a secure hash code table; and
wherein the step of generating a secure hash code table further comprises generating a secure hash code table using at least one compiled client hash value, wherein said compiled client hash value is generated by;
providing a secure system state data file;
grouping said secure system data file into one or more groups; and
, extracting the modal hash value from any of said groups.
4 Assignments
0 Petitions
Accused Products
Abstract
Apparatus, methods, and articles of manufacture are claimed for securing, maintaining, monitoring and controlling computer networks and clients located therein by use of client hash code tables, which are stored on a server. Clients subsequently provide client state codes which are compared to the hash code tables to ensure only acceptable client modifications have taken place. In the event of unacceptable client modifications, mechanisms are used to notify appropriate resources.
-
Citations
19 Claims
-
1. A method for securing, maintaining, monitoring and controlling computer networks and clients located therein, comprising:
- providing a hash code table of a client said hash code table being provided for storing a plurality of files;
providing a client state code of a client;
comparing said client state code to said hash code table, and generating an alert mechanism when a deviation threshold is reached based on a deviation between said hash code table values for said client and said client state code;wherein said hash code table includes the hash codes for files on computers within the network that are to be secured; the method further including; transmitting across a network from clients located in the network a client state code; providing at least one server within the network assigned to recognize said client state code transmission, wherein said server maintains a baseline for said client, and wherein said baseline comprises said hash code table of a said client; wherein the step of providing a hash code table of a network device further comprises providing a secure hash code table; wherein the step of providing a secure hash code table further comprises generating a secure hash code table; and wherein the step of generating a secure hash code table further comprises generating a secure hash code table using at least one compiled client hash value, wherein said compiled client hash value is generated by;
providing a secure system state data file;
grouping said secure system data file into one or more groups; and
, extracting the modal hash value from any of said groups. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
- providing a hash code table of a client said hash code table being provided for storing a plurality of files;
-
12. A computer storage component including software containing the hash code table generated by a method for securing, maintaining, monitoring and controlling computer networks and clients located therein, comprising:
- providing a hash code table of a client said hash code table being provided for storing a plurality of files;
providing a client state code of a client;
comparing said client state code to said hash code table, and generating an alert mechanism when a deviation threshold is reached based on a deviation between said hash code table values for said client and said client state code;wherein said hash code table includes the hash codes for files on computers within the network that are to be secured; the method further including; transmitting across a network from clients located in the network a client state code; providing at least one server within the network assigned to recognize said client state code transmission, wherein said server maintains a baseline for said client, and wherein said baseline comprises said hash code table of a said client;
wherein the step of providing a hash code table of a network device further comprises providing a secure hash code table;wherein the step of providing a secure hash code table further comprises generating a secure hash code table; and wherein the step of generating a secure hash code table further comprises generating a secure hash code table using at least one compiled client hash value, wherein said compiled client hash value is generated by;
providing a secure system state data file;
grouping said secure system data file into one or more groups; and
, extracting the modal hash value from any of said groups. - View Dependent Claims (13, 14, 15)
- providing a hash code table of a client said hash code table being provided for storing a plurality of files;
-
16. A method for securing, maintaining, monitoring and controlling computer networks and clients located therein, comprising:
- providing a hash code table of a client on at least one storage component of a computer network device or client;
providing a client state code of a client on at least one storage component of a computer network device or client;comparing said client state code to said hash code table, wherein said hash code table is operable for one or more client platforms; wherein providing a hash code table includes gathering baseline values to define modal values and generating said hash code table using said defined modal values, wherein each of said clients uses the same or different operating platform as another of said client, and wherein regardless of the operating platform used by a said client, said client state code is compared to said generated hash code table.
- providing a hash code table of a client on at least one storage component of a computer network device or client;
-
17. A method for securing, maintaining, monitoring and controlling computer networks and clients located therein, comprising:
- providing a network of computing components, including at least a plurality of clients, and at least one server;
providing a hash code table of a client said hash code table being provided for storing a plurality of files;
providing a client state code of a client;
comparing said client state code to said hash code table, and generating an alert mechanism when a deviation threshold is reached based on a deviation between said hash code table values for said client and said client state code;wherein said hash code table includes the hash codes for files on computers within the network that are to be secured; the method further including; transmitting across a network from clients located in the network a client state code; providing at least one server within the network assigned to recognize said client state code transmission, wherein said server maintains a baseline for said client, and wherein said baseline comprises said hash code table of a said client; wherein the step of providing a hash code table of a network device further comprises providing a secure hash code table; wherein the step of providing a secure hash code table further comprises generating a secure hash code table; and wherein the step of generating a secure hash code table further comprises generating a secure hash code table using at least one compiled client hash value, wherein said compiled client hash value is generated by;
providing a secure system state data file;
grouping said secure system data file into one or more groups; and
, extracting the modal hash value from any of said groups.
- providing a network of computing components, including at least a plurality of clients, and at least one server;
-
18. A computer storage component including software containing the hash code table generated by a method for securing, maintaining, monitoring and controlling computer networks and clients located therein, comprising:
- providing a network of computing components, including at least a plurality of clients, and at least one server;
providing a hash code table of a client said hash code table being provided for storing a plurality of files;
providing a client state code of a client;
comparing said client state code to said hash code table, and generating an alert mechanism when a deviation threshold is reached based on a deviation between said hash code table values for said client and said client state code;
wherein said hash code table includes the hash codes for files on computers within the network that are to be secured;the method further including; transmitting across a network from clients located in the network a client state code; providing at least one server within the network assigned to recognize said client state code transmission, wherein said server maintains a baseline for said client, and wherein said baseline comprises said hash code table of a said client;
wherein the step of providing a hash code table of a network device further comprises providing a secure hash code table;wherein the step of providing a secure hash code table further comprises generating a secure hash code table; and wherein the step of generating a secure hash code table further comprises generating a secure hash code table using at least one compiled client hash value, wherein said compiled client hash value is generated by;
providing a secure system state data file;
grouping said secure system data file into one or more groups; and
, extracting the modal hash value from any of said groups.
- providing a network of computing components, including at least a plurality of clients, and at least one server;
-
19. A method for securing, maintaining, monitoring and controlling computer networks and clients located therein, comprising:
- providing a network of computing components, including at least a plurality of clients, and at least one server;
providing a hash code table of a client on at least one storage component of a computer network device or client;
providing a client state code of a client on at least one storage component of a computer network device or client;comparing said client state code to said hash code table, wherein said hash code table is operable for one or more client platforms; wherein providing a hash code table includes gathering baseline values to define modal values and generating said hash code table using said defined modal values, wherein each of said clients uses the same or different operating platform as another of said client, and wherein regardless of the operating platform used by a said client, said client state code is compared to said generated hash code table.
- providing a network of computing components, including at least a plurality of clients, and at least one server;
Specification