18092171. NETWORK DEVICE AGENTLESS VALIDATION simplified abstract (AT&T Intellectual Property I, L.P.)
NETWORK DEVICE AGENTLESS VALIDATION
Organization Name
AT&T Intellectual Property I, L.P.
Inventor(s)
Gregory Herrera of Sea Girt NJ (US)
Robert Kong of Tinton Falls NJ (US)
Emily Lu of Morganville NJ (US)
Brittany Vassallo of Howell NJ (US)
Meredith Gee of Atlantic Highlands NJ (US)
NETWORK DEVICE AGENTLESS VALIDATION - A simplified explanation of the abstract
This abstract first appeared for US patent application 18092171 titled 'NETWORK DEVICE AGENTLESS VALIDATION
The abstract describes a processing system that compares baseline attributes of representative files of a network equipment type with snapshot attributes of files on a deployed device in a communication network. It identifies files or directories where the attributes do not match and takes remedial actions in response.
- The processing system obtains baseline attributes and snapshot attributes for comparison.
- It identifies discrepancies between the baseline and snapshot attributes for specific files or directories.
- Remedial actions are taken in the communication network based on the identified discrepancies.
- The system helps maintain the integrity and security of the network equipment and files.
- This technology streamlines the process of monitoring and managing files on network devices.
Potential Applications: - Network security management - File integrity monitoring in communication networks - Automated remediation of file discrepancies in network equipment
Problems Solved: - Ensuring the consistency and security of files on network devices - Streamlining the process of identifying and resolving attribute mismatches - Enhancing the overall performance and reliability of communication networks
Benefits: - Improved network security and integrity - Automated detection and resolution of file discrepancies - Enhanced efficiency in managing network equipment and files
Commercial Applications: Title: Automated File Integrity Management System for Communication Networks This technology can be utilized by network security companies, communication service providers, and IT departments to enhance the security and performance of communication networks. It can also be integrated into network monitoring and management systems for comprehensive file integrity management.
Questions about the technology: 1. How does the processing system differentiate between baseline and snapshot attributes? 2. What types of remedial actions can be performed in response to identified discrepancies?
Original Abstract Submitted
A processing system may obtain baseline attributes associated with a plurality of representative files of a first type of network equipment, where the baseline attributes comprise a plurality of baseline checksums associated with the plurality of representative files, obtain snapshot attributes associated with a first plurality of files of a first device deployed in a communication network, where the first device is of the first type of network equipment, and where the first plurality of files is associated with at least a portion of the plurality of representative files, identify at least one file of the first plurality of files or at least one directory associated with the first plurality of files, for which a respective one of the snapshot attributes fails to match a respective one of the baseline attributes, and perform at least one remedial action in the communication network in response to the identifying.