20240015223. SUB-NETWORKS BASED SECURITY METHOD, APPARATUS AND PRODUCT simplified abstract (FORESCOUT TECHNOLOGIES, INC.)

From WikiPatents
Jump to navigation Jump to search

SUB-NETWORKS BASED SECURITY METHOD, APPARATUS AND PRODUCT

Organization Name

FORESCOUT TECHNOLOGIES, INC.

Inventor(s)

Shmulik Bachar of Herzliya (IL)

Yossi Atias of Kfar-Saba (IL)

SUB-NETWORKS BASED SECURITY METHOD, APPARATUS AND PRODUCT - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240015223 titled 'SUB-NETWORKS BASED SECURITY METHOD, APPARATUS AND PRODUCT

Simplified Explanation

The abstract of this patent application describes a method, apparatus, and product for sub-networks based cyber security. The method involves detecting a device connecting to a local network that is divided into subnets. The device is identified by performing a fingerprinting operation on it. The expected usage of the device is determined and the initial set of subnets is updated based on this expected usage to generate an updated set of subnets. A subnet from the updated set is selected to connect the device based on its expected usage, and the device is connected to the selected subnet in the local network.

  • The method involves detecting and identifying devices connecting to a local network.
  • The local network is divided into subnets.
  • A fingerprinting operation is performed on the device to identify it.
  • The expected usage of the device is determined.
  • The initial set of subnets is updated based on the expected usage of the device.
  • An updated set of subnets is generated.
  • A subnet from the updated set is selected to connect the device.
  • The selected subnet corresponds to the expected usage of the device.
  • The device is connected to the selected subnet in the local network.

Potential applications of this technology:

  • Enhancing cyber security in local networks by efficiently managing device connections.
  • Improving network performance by allocating subnets based on expected device usage.
  • Streamlining network management by automating subnet selection and device connection.

Problems solved by this technology:

  • Efficiently detecting and identifying devices connecting to a local network.
  • Optimizing network resources by allocating subnets based on expected device usage.
  • Enhancing network security by ensuring devices are connected to appropriate subnets.

Benefits of this technology:

  • Improved cyber security in local networks.
  • Enhanced network performance and resource allocation.
  • Simplified network management and device connection processes.


Original Abstract Submitted

a method, apparatus and product for sub-networks based cyber security. one method includes detecting a device connecting to a local network, wherein the local network is divided into an initial set of subnets, identifying the device by performing a fingerprinting operation on the device, determining an expected usage of the device and updating the initial set of subnets based on the expected usage of the device to generate an updated set of subnets. the method further includes selecting a subnet of the updated set of subnets of the local network to connect the device based on the expected usage of the device, the selected subnet corresponding to the expected usage of the device and connecting the device to the selected subnet in the local network.