Proactive internet connectivity probe generator
First Claim
Patent Images
1. A system comprising:
- a first computing device comprising;
a first one or more network communication interfaces associated with a network protocol comprising one or more transmission layers; and
a first processor to execute processor-executable program code in order to cause the first computing device to;
receive (1) first processor-executable program code and (2) a configuration file specifying (i) a target internet protocol address, (ii) an asset-identifying information type to identify a particular hardware machine, and (iii) a security protocol for transmission over the one or more transmission layers, the security protocol comprising public key encryption via a public key, a unique asynchronous key, or password-protection wherein in a case that the security protocol is public key encryption, the configuration file comprises the public key; and
execute the received first processor-executable program code to;
identify the first one or more network communication interfaces by probing the one or more transmission layers;
generate a message including information conforming to the asset-identifying information type, the information identifying a first asset;
secure the message based on the security protocol; and
transmit the secure message to the target internet protocol address via each of the first one or more network communication interfaces.
2 Assignments
0 Petitions
Accused Products
Abstract
Described herein are reception of first processor-executable program code and a configuration file specifying a target internet protocol address, an asset-identifying information type, and a security protocol, and execution of the received first processor-executable program code to identify a first one or more network communication interfaces of the first computing system, generate a message including information conforming to the asset-identifying information type, the information identifying a first asset, secure the message based on the security protocol, and transmit the secure message to the target internet protocol address via each of the first one or more network communication interfaces.
17 Citations
20 Claims
-
1. A system comprising:
a first computing device comprising; a first one or more network communication interfaces associated with a network protocol comprising one or more transmission layers; and a first processor to execute processor-executable program code in order to cause the first computing device to; receive (1) first processor-executable program code and (2) a configuration file specifying (i) a target internet protocol address, (ii) an asset-identifying information type to identify a particular hardware machine, and (iii) a security protocol for transmission over the one or more transmission layers, the security protocol comprising public key encryption via a public key, a unique asynchronous key, or password-protection wherein in a case that the security protocol is public key encryption, the configuration file comprises the public key; and execute the received first processor-executable program code to; identify the first one or more network communication interfaces by probing the one or more transmission layers; generate a message including information conforming to the asset-identifying information type, the information identifying a first asset; secure the message based on the security protocol; and transmit the secure message to the target internet protocol address via each of the first one or more network communication interfaces. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
8. A non-transitory computer-readable medium storing program code, the program code executable by a processor of a first computing system to cause the first computing system to:
receive (1) first processor-executable program code and (2) a configuration file specifying (i) a target internet protocol address, (ii) an asset-identifying information type, and (iii) a security protocol for transmission over one or more transmission layers associated with a network protocol, the security protocol comprising public key encryption via a public key, a unique asynchronous key, or password-protection wherein in a case that the security protocol is public key encryption, the configuration file comprises the public key; and execute the received first processor-executable program code to; identify a first one or more network communication interfaces of the first computing system by probing the one or more transmission layers; generate a message including information conforming to the asset-identifying information type, the information identifying a first asset; secure the message based on the security protocol; and transmit the secure message to the target internet protocol address via each of the first one or more network communication interfaces. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
15. A computer-implemented method comprising:
-
receiving, at a first computing system, (1) first processor-executable program code and (2) a configuration file specifying (i) a target internet protocol address, (ii) an asset-identifying information type, and (iii) a security protocol for transmission over one or more transmission layers associated with a network protocol, the security protocol comprising public key encryption via a public key, a unique asynchronous key, or password-protection wherein in a case that the security protocol is public key encryption, the configuration file comprises the public key; executing the received first processor-executable program code at the first computing system to; identify a first one or more network communication interfaces of the first computing system by probing the one or more transmission layers; generate a message including information conforming to the asset-identifying information type, the information identifying a first asset; secure the message based on the security protocol; and transmit the secure message to the target internet protocol address via each of the first one or more network communication interfaces. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification