Method and system for a network management console
First Claim
1. A data network management system for identifying unauthorized access to a data network service, provided at a service node in a data network, by a user node in said data network, said service node having an agent and having means for maintaining a user access list, said user access list having at least one data network address corresponding to at least one user node in said data network, said system comprising:
- a data communication means for periodically polling said agent at said service node and for retrieving a user access list from said agent, said user access list specifying which users have accessed said service node;
a database for maintaining an authorized access list for said service node, said authorized access list specifying which users are authorized to access said service node; and
a data processing means for detecting unauthorized access to said service node by comparing said user access list to said authorized access list and for updating said authorized access list based on the user access list retrieved from said agent.
6 Assignments
0 Petitions
Accused Products
Abstract
A method and a system for identifying unauthorized accesses to a data network service by a particular node in a data network is disclosed. The NMC communicates with an agent periodically to gather a list of users of the service node. An agent is installed on the service node to monitor all network accesses to the service. By configuring the agent to monitor all access to the service node, through SNMP or a similar protocol, the agent maintains a list of all accesses to that service node. This list is stored internally by the agent and queried for by the NMC periodically. The access information stored by the agent is periodically retrieved by the NMC for all monitored nodes and compared with the authorization list for the node. If unauthorized accesses are found, they are identified by the NMC. These unauthorized accesses can be notified to the appropriate entity in a number of ways such as through paging, email or a report viewable through the NMC.
-
Citations
20 Claims
-
1. A data network management system for identifying unauthorized access to a data network service, provided at a service node in a data network, by a user node in said data network, said service node having an agent and having means for maintaining a user access list, said user access list having at least one data network address corresponding to at least one user node in said data network, said system comprising:
-
a data communication means for periodically polling said agent at said service node and for retrieving a user access list from said agent, said user access list specifying which users have accessed said service node; a database for maintaining an authorized access list for said service node, said authorized access list specifying which users are authorized to access said service node; and a data processing means for detecting unauthorized access to said service node by comparing said user access list to said authorized access list and for updating said authorized access list based on the user access list retrieved from said agent. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method for identifying unauthorized access to a data network service, provided at a service node in a data network, by a user node in said data network, said service node having an agent and having means for maintaining a user access list, said user access list having at least one data network address corresponding to at least one user node in said data network, said method comprising:
-
a) periodically polling an agent and retrieving said user access list, for a given period of time, from said service node in said data network; b) comparing said user access list to an authorized access list; c) determining if an access to said service node was unauthorized based on comparing said user access list to the authorized access list; and d) if said access was not authorized, initiating a notification process; wherein said user access list specifies which users have accessed said service node. - View Dependent Claims (8, 9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer-readable medium for identifying unauthorized access to a data network service, provided at a service node in a data network, by a user node in said data network, said service node having an agent and having means for maintaining a user access list, said user access list having at least one data network address corresponding to at least one user node in said data network, and said medium having stored thereon, computer-readable and computer-executable instructions which, when executed by a processor, cause said processor to perform steps comprising:
-
a) periodically polling an agent and retrieving said user access list, for a given period of time, from said service node in a data network; b) comparing said user access list to an authorized access list; c) determining if an access to said data network service was authorized based on said comparison step b); d) if determined that said access was unauthorized, initiating a notification process; wherein said user access list specifies which users have accessed said service node. - View Dependent Claims (16, 17, 18, 19)
-
-
20. A computer for use in a data network for identifying unauthorized access to a data network service, provided at a service node in a data network, by a user node in said data network, said service node having an agent and having means for maintaining a user access list, said user access list having at least one data network address corresponding to at least one user node in said data network;
- said computer comprising;
means for storing an authorized access list for said service node, said authorized access list specifying which users are authorized to access said service node; a central processing unit; data communication means for periodically polling said agent at said service node and retrieving a user access list from said agent said user access list specifying which users have accessed said service node; and data processing means for comparing said retrieved user access list to said authorized access list and for updating said authorized access list based on the user access list retrieved from said agent.
- said computer comprising;
Specification