Cloaked device scan
A technology of equipment and physical equipment, applied in the system field of the target equipment, can solve the problems of no cost efficiency, expensive time density, not user friendly, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0016] Aspects of the invention allow passive monitoring of network devices by collecting available data from routers and switches connected to the network. Figure 1 depicts a simplified example network upon which the present invention can be utilized. Network 100 may have multiple routers 110 , 130 , 142 , 144 and 150 , and multiple switches 120 and 160 attached to it. The network may be a local area network (LAN) with discrete subnets, or may be multiple LANs, such as network 140 separated by wide area network (WAN) 170 . Figure 1 is a simplified example of an extended and complex enterprise network, with examples of the many types of equipment that can be utilized. For example, the present invention may be used to locate targeted or unauthorized laptops 136 and 146 , desktops 124 , 152 , and 164 , wireless access point 114 , network bridge 134 , or gaming device 166 . FIG. 1 also illustrates the breadth of networking technologies that can be utilized, such as Ethernet bac...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com