Information security – Access control or authentication – Network
Reexamination Certificate
2006-05-30
2008-12-30
Parthasarathy, Pramila (Department: 2136)
Information security
Access control or authentication
Network
C370S254000
Reexamination Certificate
active
07472412
ABSTRACT:
A policy engine generates configlets that are vendor-neutral, vendor-specific or both, based on a selected target level and a selected device/device group. A translator translates and combines the configlets to form vendor-dependent configuration files. The policy engine generates the configlets using policies associated with the selected target level and its sub-target levels, as defined by a target level hierarchy. A policy includes at least a condition, and an action which the policy engine performs if the condition is true. In performing the action, the policy engine typically writes to at least a partial configlet. A policy may further include a verification clause, which is used to verify a running configuration. Policy dependencies may also be defined such that where a second policy is dependent on a first policy, the second policy must be evaluated after the first policy. This is necessary, where, for example, the first policy generates and stores a value to be used by the second policy. Policies are small programs written as small programs. A configlet hierarchy is defined, such that a child configlet inherits properties which it does not define from its parent. A mapping function maps infrastructure data in a first format to a second format, so that the second format is recognizable by the policy engine. A loader batches, schedules and loads a configuration file to its intended device. Upon replacing a first device using a first configuration format with a second device using a second configuration format, the first device's configuration is read in or uploaded and reverse-translated into configlets. The configlets are then translated into a configuration formatted for the second device. The system retains device logins and passwords in encrypted format. A user desiring to connect to a device must log in to the system instead. The system in turn logs in or connects to the device and passes information back and forth between the user and the device, as if the user were logged directly into the device.
REFERENCES:
patent: 5506966 (1996-04-01), Ban
patent: 5535335 (1996-07-01), Cox
patent: 5659746 (1997-08-01), Bankert
patent: 5680551 (1997-10-01), Martin
patent: 5751965 (1998-05-01), Mayo
patent: 5812768 (1998-09-01), Page
patent: 5819042 (1998-10-01), Hansen
patent: 5878432 (1999-03-01), Misheski
patent: 5889943 (1999-03-01), Ji
patent: 5901320 (1999-05-01), Takahashi
patent: 5923850 (1999-07-01), Barroux
patent: 5999948 (1999-12-01), Nelson
patent: 6014697 (2000-01-01), Lewis
patent: 6085253 (2000-07-01), Blackwell
patent: 6088804 (2000-07-01), Hill
patent: 6173312 (2001-01-01), Atarashi
patent: 6211877 (2001-04-01), Steele
patent: 6226654 (2001-05-01), Van Hoff
patent: 6240458 (2001-05-01), Gilbertson
patent: 6243815 (2001-06-01), Antur
patent: 6247049 (2001-06-01), Scott
patent: 6253240 (2001-06-01), Axberg
patent: 6272526 (2001-08-01), Robinson
patent: 6286038 (2001-09-01), Reichmeyer
patent: 6338149 (2002-01-01), Ciccone
patent: 6363421 (2002-03-01), Barker
patent: 6374293 (2002-04-01), Dev
patent: 6426959 (2002-07-01), Jacobson
patent: 6449646 (2002-09-01), Sikora
patent: 6453255 (2002-09-01), Smorodinsky
patent: 6466580 (2002-10-01), Leung
patent: 6470453 (2002-10-01), Vilhuber
patent: 6473775 (2002-10-01), Kusters
patent: 6496858 (2002-12-01), Frailong
patent: 6546416 (2003-04-01), Kirsch
patent: 6564056 (2003-05-01), Fitzgerald
patent: 6571285 (2003-05-01), Groath
patent: 6598177 (2003-07-01), Jones
patent: 6615218 (2003-09-01), Mandal
patent: 6628304 (2003-09-01), Mitchell
patent: 6643289 (2003-11-01), Natanson
patent: 6678370 (2004-01-01), Freebersyser
patent: 6684241 (2004-01-01), Sandick
patent: 6725262 (2004-04-01), Choquier
patent: 6725264 (2004-04-01), Christy
patent: 6732175 (2004-05-01), Abjanic
patent: 6738910 (2004-05-01), Genty
patent: 6760761 (2004-07-01), Sciacca
patent: 6760767 (2004-07-01), Miesbauer
patent: 6766369 (2004-07-01), Haitsuka
patent: 6772206 (2004-08-01), Lowry
patent: 6782474 (2004-08-01), Ylonen
patent: 6810427 (2004-10-01), Cain
patent: 6816897 (2004-11-01), McGuire
patent: 6832247 (2004-12-01), Cochran
patent: 6834298 (2004-12-01), Singer
patent: 6847994 (2005-01-01), Akimoto
patent: 6865673 (2005-03-01), Nessett
patent: 6895431 (2005-05-01), Bero
patent: 6895588 (2005-05-01), Ruberg
patent: 6907572 (2005-06-01), Little
patent: 6931016 (2005-08-01), Andersson
patent: 6931444 (2005-08-01), Schweitzer
patent: 6938079 (2005-08-01), Anderson
patent: 6959332 (2005-10-01), Zavalkovsky
patent: 6978301 (2005-12-01), Tindal
patent: 6990591 (2006-01-01), Pearson
patent: 7003560 (2006-02-01), Mullen
patent: 7016955 (2006-03-01), Martin
patent: 7016980 (2006-03-01), Mayer et al.
patent: 7127526 (2006-10-01), Duncan
patent: 7145871 (2006-12-01), Levy
patent: 2001/0034771 (2001-10-01), Hutsch
patent: 2001/0053991 (2001-12-01), Bonabeau
patent: 2002/0007411 (2002-01-01), Shaked
patent: 2002/0032775 (2002-03-01), Venkataramaiah
patent: 2002/0032871 (2002-03-01), Malan
patent: 2002/0052719 (2002-05-01), Alexander
patent: 2002/0069143 (2002-06-01), Cepeda
patent: 2002/0072956 (2002-06-01), Willems
patent: 2002/0078068 (2002-06-01), Krishnaprasad
patent: 2002/0078382 (2002-06-01), Sheikh
patent: 2002/0143927 (2002-10-01), Maltz
patent: 2002/0161863 (2002-10-01), McGuire
patent: 2002/0169858 (2002-11-01), Bellinger
patent: 2002/0173997 (2002-11-01), Menard
patent: 2002/0194289 (2002-12-01), Engel
patent: 2003/0016685 (2003-01-01), Berggreen
patent: 2003/0018702 (2003-01-01), Broughton
patent: 2003/0018765 (2003-01-01), Muhlestein
patent: 2003/0061312 (2003-03-01), Bodner
patent: 2003/0065919 (2003-04-01), Albert
patent: 2003/0084009 (2003-05-01), Bigus
patent: 2003/0135547 (2003-07-01), Kent
patent: 2003/0158894 (2003-08-01), Ziserman
patent: 2003/0187964 (2003-10-01), Sage
patent: 2003/0200459 (2003-10-01), Seeman
patent: 2004/0001493 (2004-01-01), Cloonan
patent: 2004/0015592 (2004-01-01), Selgas
patent: 2004/0024736 (2004-02-01), Sakamoto
patent: 745929 (1996-12-01), None
patent: 0952521 (1999-10-01), None
patent: 8139757 (1996-05-01), None
NOMS, IEEE 1992 Network Operations and Management Symposium, 1992, vol. 1, IEEE Communications Society, New York, USA.
HP OpenView for Windows Workgroup Node Manager User Guide, 3COM, Jan. 1997, Part No. 09-1114-000, Hewlett-Packard Co., Santa Clara, CA USA.
Administrator's Guide, Formulator 3.0, 2000-2002, Gold Wire Technology Inc.
User Guide, Formulator 1.0, 2000-2001, Gold Wire Technology Inc.
Superstack II Hub TR Network Management Module Installation Guide 3COM Jan. 1997, Hewlett-Packard Co., Santa Clara, CA USA.
Initially Configuring the ATM Switch Router, Cisco, Oct. 19, 2000, pp. 1-42.
Common Information Model—A Developer's Perspecti ve, IEEE, 1998, p. 1.
Liu, Stephen, Cisco IOS Command Line Interface Tutorial, 1997, Small/Medium Business Solutions, www.cisco.com/warp/cpropub/45/tutorial.htm.
Yeong et al., Lightweight Directory Access Protocol, RFC 1487, Jul. 1993.
Anderson Christopher B.
Del Vecchio Brian A.
Haag Michael D.
Mellor Arthur B.
Tackabury Wayne F.
Cooley Godward Kronish LLP
Parthasarathy Pramila
LandOfFree
Network configuration manager does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Network configuration manager, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Network configuration manager will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4020289