Exportable encoded identifications of networked machines
First Claim
1. A method, comprising:
- identifying, by a processor, a software package installed on a client machine managed by a remote management platform;
generating, by the processor, an encoded identification of the client machine in response to identifying the software package residing on the client machine, wherein the encoded identification is a first hash value based at least in part of the software package in a first state;
registering, by the processor with the remote management platform, the encoded identification of the client machine;
generating, by the processor, an update to the encoded identification of the client machine to obtain an updated encoded identification in response to a detected change in the software package on the client machine, wherein the updated encoded identification is a second hash value based at least in part of the software package in a second state;
receiving, by the processor, a request from the remote management platform to execute an operation on the client machine, the request comprising an identification;
determining, by the processor, whether there is a match between the identification in the request and the updated encoded identification; and
executing, by the processor, the operation on the client machine in response to the match.
1 Assignment
0 Petitions
Accused Products
Abstract
Embodiments relate to systems and methods for generating exportable encoded identifications of networked machines based on installed package profiles. A physical or virtual client machine can host a set of installed software packages, including operating system, application, and/or other software. A package manager tracks the set of installed packages and updates available for the installed set. The package manager can be configured to capture an inventory of the installed packages, and generate an encoded identification of the entire package complement and/or selected subsets of those packages. In aspects, the encoded identification can be based on a set of attributes of the installed packages and/or their constituent files, such as file names, version numbers, size, and/or other attributes. The encoded identification for the client machine can be transmitted to one or more remote management platforms, such as package servers, network management servers, or others for remote operations on the client machine.
85 Citations
15 Claims
-
1. A method, comprising:
-
identifying, by a processor, a software package installed on a client machine managed by a remote management platform; generating, by the processor, an encoded identification of the client machine in response to identifying the software package residing on the client machine, wherein the encoded identification is a first hash value based at least in part of the software package in a first state; registering, by the processor with the remote management platform, the encoded identification of the client machine; generating, by the processor, an update to the encoded identification of the client machine to obtain an updated encoded identification in response to a detected change in the software package on the client machine, wherein the updated encoded identification is a second hash value based at least in part of the software package in a second state; receiving, by the processor, a request from the remote management platform to execute an operation on the client machine, the request comprising an identification; determining, by the processor, whether there is a match between the identification in the request and the updated encoded identification; and executing, by the processor, the operation on the client machine in response to the match. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system, comprising:
-
a data store to store a software package to be installed on a client machine; and a processor, operatively coupled with the data store, to; identify the software package on the client machine managed by a remote management platform, generate an encoded identification of the client machine in response to identifying the software package, wherein the encoded identification is a first hash value based at least in part of the software package in a first state; register, with the remote management platform, the encoded identification of the client machine; generate an update to the encoded identification of the client machine to obtain an updated encoded identification in response to a detected change in the software package on the client machine, wherein the updated encoded identification is a second hash value based at least in part of the software package in a second state; receive a request from the remote management platform to execute an operation on the client machine, the request comprising an identification; determine whether there is a match between the identification in the request and the updated encoded identification; and execute the operation on the client machine in response to the match. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
15. A non-transitory computer-readable storage medium comprising instructions that, when executed by a processor, cause the processor to:
-
identify a software package installed on a client machine managed by a remote management platform; generate, by the processor, an encoded identification of the client machine in response to identifying the software package, wherein the encoded identification is a first hash value based at least in part of the software package in a first state; register, with the remote management platform, the encoded identification of the client machine; generate, by the processor, an update to the encoded identification of the client machine to obtain an updated encoded identification in response to a detected change in the software package on the client machine, wherein the updated encoded identification is a second hash value based at least in part of the software package in a second state; receive, by the processor, a request from the remote management platform to execute an operation on the client machine, the request comprising an identification; determine, by the processor, whether there is a match between the identification in the request and the updated encoded identification; and execute, by the processor, the operation on the client machine in response to the match.
-
Specification