Network management
First Claim
1. A network management tool configured to operate on a first computer that includes a processor and a memory, which includes a non-transitory computer readable medium, the network management tool comprising:
- a network management services module configured to be provisioned into a personal computer serviced by a common gateway shared by a plurality of end user devices in a home networking environment, wherein the network management services module includes an intruder detection module configured to implement a policy for a new device discovered on a local network, wherein the discovery process is at least partially based upon a dynamic host configuration protocol (DHCP), wherein the common gateway is identified by using a request for a hyptertext transfer protocol page with intentionally incorrect security credential information.
2 Assignments
0 Petitions
Accused Products
Abstract
A tool for managing a computer network includes a gateway service module that identifies a gateway for a network and a network information service module. The network information service module identifies devices in the network, determines at least one property for each of the identified devices, and creates a network information data structure for storing device properties. A communication agent service module transmits at least one determined device property to other agent service modules associated with the network, receives at least one device property from another agent service module associated with the network, and provides the received at least one property device to the network information service module. A method of monitoring a computer network is also provided. The method includes identifying devices in a network, determining at least one property for each of the identified devices, receiving at least one determined device property from another device the network, and creating a network information data structure for storing the determined device properties.
-
Citations
20 Claims
-
1. A network management tool configured to operate on a first computer that includes a processor and a memory, which includes a non-transitory computer readable medium, the network management tool comprising:
a network management services module configured to be provisioned into a personal computer serviced by a common gateway shared by a plurality of end user devices in a home networking environment, wherein the network management services module includes an intruder detection module configured to implement a policy for a new device discovered on a local network, wherein the discovery process is at least partially based upon a dynamic host configuration protocol (DHCP), wherein the common gateway is identified by using a request for a hyptertext transfer protocol page with intentionally incorrect security credential information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
12. A method, comprising:
-
discovering a new device on a local network via a network management tool to be provisioned in a personal computer serviced by a common gateway shared by a plurality of end user devices in a home networking environment, wherein the discovery process is at least partially based upon a dynamic host configuration protocol (DHCP), wherein the common gateway is identified by using a request for a hyptertext transfer protocol page with intentionally incorrect security credential information; and implementing a policy for the new device based on whether the new device is identified as an intruder. - View Dependent Claims (13, 14, 15, 16)
-
-
17. Logic encoded in non-transitory media that includes code for execution and when executed by a processor operable to perform operations comprising:
-
discovering a new device on a local network via a network management tool to be provisioned in a personal computer serviced by a common gateway shared by a plurality of end user devices in a home networking environment, wherein the discovery process is at least partially based upon a dynamic host configuration protocol (DHCP), wherein the common gateway is identified by using a request for a hyptertext transfer protocol page with intentionally incorrect security credential information; and implementing a policy for the new device based on whether the new device is identified as an intruder. - View Dependent Claims (18, 19, 20)
-
Specification