Automatic access to network devices using various authentication schemes
First Claim
1. A system comprising:
- an access protocol model that is configured to model a plurality of access protocols, and an access protocol discovery module that is configured to use the access protocol model to discover an access protocol that is suitable for accessing a device on a network.
21 Assignments
0 Petitions
Accused Products
Abstract
An access discovery method and system discovers and stores the proper access protocol for each device on a network. The discovery process includes progressively sequencing through state transitions until a successful access protocol sequence is determined, and an access script corresponding to this sequence is stored for subsequent access to the device. Preferably, the protocol-discovery algorithm is modeled as a state table that includes a start state and two possible terminal states: success and failure. A state machine executes the state table until a terminal state is reached; if the terminal state is a failure, the system backtracks to attempt an alternative sequence. The process continues until the success state is reached or until all possible sequences are executed without success. An exemplary state model is provided that has been shown to be effective for modeling network devices from a variety of vendor devices.
36 Citations
36 Claims
-
1. A system comprising:
-
an access protocol model that is configured to model a plurality of access protocols, and an access protocol discovery module that is configured to use the access protocol model to discover an access protocol that is suitable for accessing a device on a network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A method comprising:
-
providing an access protocol model that is configured to model a plurality of access protocols, and attempting to access a device on a network by processing the access protocol model to discover an access protocol that is suitable for accessing the device. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25)
-
-
26. A computer program stored on a computer readable medium, which, when executed by a processor, causes the processor to:
-
receive an access protocol model that is configured to model a plurality of access protocols, and attempt to access a device on a network by processing the access protocol model to discover an access protocol that is suitable for accessing the device. - View Dependent Claims (27, 28, 29, 30, 31, 32, 33, 34, 35, 36)
-
Specification