WO2002082215A2 - A user interface for computer network management - Google Patents
A user interface for computer network management Download PDFInfo
- Publication number
- WO2002082215A2 WO2002082215A2 PCT/US2002/010588 US0210588W WO02082215A2 WO 2002082215 A2 WO2002082215 A2 WO 2002082215A2 US 0210588 W US0210588 W US 0210588W WO 02082215 A2 WO02082215 A2 WO 02082215A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- computer network
- network
- wireless device
- devices
- network management
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/22—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks comprising specially adapted graphical user interfaces [GUI]
Definitions
- This invention relates to computer network management ariS, more specifically, to a method and system for managing such a network with a menu driven diagnosis and problem solving interface in conjunction with wireless devices.
- NMS systems network management systems
- ⁇ MS systems are network management systems that automatically monitor computer networks. Examples of such systems are Hewlett Packard's OpenNiew and IBM's Tivoli. These systems are designed to monitor a number of computer network parameters (e.g., uptime of a device or the switch state of a router).
- ⁇ MS systems are also typically configurable to allow the end user to construct custom applications for monitoring the computer network and the devices making up the network. These systems do not, however, allow the IT professional to fix computer problems and certainly not from remote locations.
- the ⁇ MS systems are also typically designed to set traps when particular conditions occur (e.g., a server goes down or an attack on the firewall).
- the ⁇ MS systems are equipped to send alerts to the IT professional via an e-mail or message to a pager. Many alerts require immediate attention.
- the IT professional must go to a terminal in the computer network to address the problem or, in a remote situation, find access to the Internet and connect a laptop to the web and engage in a Telnet session to fix the problem. If the IT professional is at home, or worse, in bed, the professional is required to go to the office or connect to the network with remote access. While most problems will ultimately be fixed, current methods for addressing such problems are not ideally efficient. With minutes of downtime correlating to millions in damage, to use an old phrase, "every second counts.”
- a user interface for controlling a computer network.
- the user interface comprises a device menu, a device selection identifier, function menus, a function selection identifier, and a results screen.
- the device menu identifies at least some of the devices that comprise the computer network.
- the device selection identifier allows a user to select one of the devices.
- the function menus correspond to the devices and identify at least some functions that can be performed in connection with the devices.
- the function selection identifier corresponds to the function menus that allow the entity to select one of the functions. The user is able to select one of the devices comprising the computer network and is able to select one of the functions corresponding to the device that is selected.
- the result screen displays a result corresponding to the function that is selected by the user.
- the devices comprise network routers and servers, and can include any other hardware or software upon which network management functions are desirable.
- typical functions can include statistics, device management functions, reboot/shutdown, and an activity log.
- the user interface is used in conjunction with wireless devices.
- a method for implementing this embodiment comprises generating an action signal from a wireless device.
- the action signal corresponds to a desired network management action to be performed in connection with the computer network.
- the method further includes sending the action signal to the computer network and processing the action signal.
- the method also includes performing the desired network management action on the computer network. Further, the method preferably includes obtaining a result pertaining to the desired network management action and sending the result to the wireless device.
- a security clearance procedure is performed prior to sending the action signal to ensure that the desired network management action is authorized.
- the security clearance procedure can comprise sending a password from the wireless device to the computer network and verifying that the password corresponds to an authorized entity.
- the method can also include encrypting the signal and password prior to sending the signal and password and decrypting the signal and password at the computer network.
- the password is corresponded to a predefined set of authorized actions that an entity is authorized to perform on the computer network and the entity is only allowed to perform the authorized actions.
- the authorized set of actions is typically less than a total number of actions that can be performed on the computer network.
- the present invention therefore overcomes problems associated with the prior art.
- the simplified user interface allows most network management on most computer network devices to be readily performed. Further, the user interface significantly reduces information transmitted between the information technology professional and the network device, thus rendering the user interface ideal for wireless network management.
- the user interface is adapted to work in conjunction with existing network management systems (NMS). Thus, alerts generated by the NMS system can be transmitted to the user (to a wireless device or terminal). The user interface allows the user to readily view the alert and take corrective action.
- NMS network management systems
- Figure 1 is a network diagram illustrating a preferred embodiment of the invention in which the network management system and method is used in conjunction with wireless devices.
- Figure 2 is an activity diagram illustrating the general flow of the menu system interface.
- Figure 3 is a deployment diagram illustrating the interface between the application server, the wireless devices, external network management systems (NMS), and the network devices over which the system and method of the present invention provides control.
- NMS network management systems
- Figure 4 is a sequence diagram that reflects the method by which a user implements the network management menu system of the present invention and how the application server and its modules implement the action chosen by the user.
- Figure 5 is a class diagram that further illustrates the modules of the application server.
- FIG. 6 is a sequence diagram that illustrates the present invention operating in conjunction with a network management system (NMS).
- NMS network management system
- the present invention is directed to a network management system and a method of managing a computer network. Specifically, it is directed to a menu driven system that streamlines existing, more cumbersome interfaces, such as Telnet, to facilitate gathering information about a network and taking corrective action to fix or maintain it.
- the menu-driven system also renders possible the ability to perform network management via wireless devices from locations remote to the computer network.
- the term computer network is defined broadly to include those components that comprise computer systems that are used by businesses, large and small. Examples include servers (software and hardware), routers, switches, software applications, and database storage.
- the present invention is also adapted to work in connection with network management systems (NMS systems) such as Hewlett Packard's OpenNiew and IBM's Tivoli. Such systems are well known in the art and are typically resident on a computer network server.
- NMS systems network management systems
- the software is adapted to monitor parameters from various computer network components to provide data regarding component performance and statistics.
- the software is also adapted to set traps and send alerts in the event that important thresholds or events occur.
- Wireless devices 22 e.g., a two-way pager, personal data assistant (PDA), or a cellular telephone
- WAP wireless application protocol
- a firewall 28 is resident on an application server 30 and ensures secure communications between the wireless device 22 and the computer network, generally designated 32.
- the application server 30 enables the interface between the wireless device 22 and the computer network, as described in detail below.
- the application server 30, when activated, causes a menu driven system (described below) to be displayed on the wireless device 22.
- the description that follows will begin by explaining a sample menu system and follows with an explanation of the software and methodology necessary to enable the menu system.
- IP Internet protocol
- password means a unique user identification, such as traditional word and/or number passwords, DNA, or fingerprint recognition.
- a menu driven interface is provided to simplify the Telnet session to decrease the information transmitted during the session to that necessary to monitor, diagnose and/or fix the computer network. The interface therefore overcomes existing bandwidth problems and facilitates using wireless devices to maintain a computer network from remote locations.
- an exemplary menu system is described. Because each network is comprised of different hardware and software components, a customized menu system will be provided for each network, as is readily understood and implemented by one skilled in the art in conjunction with the description that follows. The described menu system will closely approximate the overall architecture and flow common to most applications.
- the wireless device will preferably have an icon to launch the network management program.
- the first screen will prompt the user for a password or PIN number to ensure that the person holding the wireless device is authorized to access the computer network. This latter safeguard is particularly important in the event that the wireless device is lost.
- the screen preferably appears as follows:
- the "Title Information” could be anything, including a customizable field for the company name to personalize the application to the company that owns the computer network, or it could be the name of the network management product with contact information, or some other introductory information as desired.
- the pin number can be any number of characters to ensure a desirable security level.
- the software should cause the entered characters to be displayed as stars or similar characters to prevent an onlooker from viewing the PIN number, as is well known in the art.
- the "OK” icon allows the PIN to be accepted when completed and the "EXIT” allows the user to exit the program in the event the program icon has been accidentally activated or in the event the user otherwise determines that he or she no longer wishes to enter the program.
- the PIN number will be correlated to a particular user group.
- different sets of privileges can be assigned to particular groups or individuals.
- the head of the IT department will be accorded full privileges, where lower level personnel might be afforded fewer privileges (e.g., preventing such personnel from re-booting the server).
- the user After logging on to the system, the user is preferably greeted with the following screen:
- the Main Menu presents the user with six primary options, as shown above.
- Alerts are desirably placed at the top of the list because they typically are triggered by equipment malfunctions or similar critical events.
- the alerts can be received in any format, but preferably XML.
- a subsequent screen is retrieved from the application server 30, as described below.
- the "[#]" symbol behind the "alerts” and “bulletins” icons indicates the number of alerts or bulletins that are listed.
- the "HELP” icon retrieves a sample screen with explanations of how to navigate the interface.
- the "BACK” icon returns the user to the previous screen. The icon could be replaced with an arrow pointing to the left, as is typical in many software applications.
- the alerts reflect the date and time of the alert.
- the alert also reflects the device name within the network (in the brackets).
- the alert also provides information regarding the problem with the device.
- the bullet points in the left margin can be a box symbol that can be "checked” to show that the alert has been addressed.
- the "checking" action is preferably transmitted to the application server so that it is updated to reflect this in the event other technicians access the network management system.
- many wireless devices primarily personal data assistants (PDAs)
- PDAs personal data assistants
- the screen depicts two bulletins with the date of the bulletin.
- Bulletins are general messages to all users, informing them of system-wide conditions and notifications. Examples of such conditions and notifications could include: a cable topology segment outage, the estimated time until a problem resolution, the allocation of technicians to certain tasks, reminders of scheduled events, etc.
- This bulletin feature allows a degree of communication and collaboration common among the technical staff, and thereby enhancing the efficiency of technical operations. Bulletins can be added and removed at will at any time.
- the brackets enclose the initials of the person posting the bulletin.
- the short message that follows reflects the information of the bulletin.
- the listed icons provide the primary computer network components that are typically present.
- An IT professional is able to access a device not covered by the three listed categories (i.e., NT Server Admin, Unix Server Admin, or Router Management) by providing a device name.
- the "Submit" icon submits the request to locate a device by name or IP address.
- the title at the top designates that the user is at the screen for WWW Servers and the title at the bottom indicates that the screen is a drop down menu from the NT Group. If a particular "WWW Server" is selected (e.g., "ARSRVWWW2), the following menu will appear:
- ARSRNWWW2 ARSRNWW2
- ARSRNWWW2 ARSRNWW2
- the "Restart Service” and “Stop Service” are icons that will initiate the corresponding action to the FTP Server.
- the “Status” line indicates that the FTP Server is running. This information is transferred in real-time from the application server 30 to the wireless device 22.
- the following is a sample screen for the "Reboot/Shut Down" icon:
- this screen will normally include a long list, it is beneficial to use a wireless device that provides a scroll function. Further, to ensure that the amount of transmitted data is limited, it is preferred to adjust the application server to provide log entries back to a predetermined date, preferably a date that provides a sufficient log history to assist the IT professional in analyzing the network but not so long as to provide information that is no longer of interest.
- the first screen generated in connection with the selection of a particular product is the functions menu:
- the above screen reflects a computer network where a business has several locations in a particular city (e.g., its headquarters) and several satellite offices in the designated cities. By selecting a particular location (selecting the corresponding icon and confirming by selecting the "Submit" icon), a menu is generated showing the routers at a particular location. Further menus with corresponding functions and actions to be taken in connection with a particular router are available. For example, the following functions can be made part of a router function menu:
- the application server 30 will generate a response screen indicating that a particular function has been performed successfully or unsuccessfully, e.g., in the case of a device ping.
- menu system is merely an example to illustrate the invention.
- menu items can be added or removed as desired and to correspond to the specific network devices and corresponding functions.
- the goal is to provide common network management functions in an easy-to-use, simplified format.
- Figure 2 is an activity diagram reflecting the general flow architecture for the system and method.
- the wireless device will typically have a bookmark or icon dedicated to launching the network management program.
- the first screen is the login screen.
- the user is prompted to input a password.
- the password serves two purposes: 1) validates the user is authorized to use the system; and 2) determines what permissions or privileges govern the user's capabilities.
- the general architecture is to provide the user with the opportunity to find a network device or application through a series of drill-down selections (e.g., list of selectable devices) and menus, or if the user knows the specific device identifier, e.g., name or IP address, the user can enter and proceed directly to the menus for the device, as shown at 52 and 54, respectively, in Figure 2.
- the user is presented with a dynamic menu of functions corresponding to a specific device, as generally designated at 56 in Figure 2.
- the contents of a dynamic menu can vary, as explained above.
- the displayed functions are preferably based on two criteria: 1) the functions specific to and available for a device; and 2) the permissions or privileges corresponding to the user.
- the first criterion is, of course, mandatory in the sense that a function cannot be effectively provided if the device is not capable of performing the function.
- the second criterion is optional, but, in systems where there are more than one IT professional responsible for network management, the second criterion ensures that lower level personnel are not able to perform severe network functions or functions that are more appropriately handled by upper-level IT professionals.
- dynamic menu content can contain items that never change, i.e., are required in all cases. Examples can include: links to online help text, application navigation methods, display of session variables such as user name or device name, etc.
- the user is able to perform a variety of functions on a particular device and the results are transmitted to the user, as reflected at 58 in Figure 2.
- Common functions include, but are not limited to:
- Start / Stop Services - services or processes run continually on computers and can include items such as Web Servers, applications such as PC Anywhere, File Transfer Protocol (FTP), print queue management, e-mail delivery, etc.
- FTP File Transfer Protocol
- Reboot - devices can be shut down, or re-started as a step in resolving or ' troubleshooting a problem.
- Ping - a router can gather statistics as a result of pinging another device. This is a common non-invasive method used during network troubleshooting.
- Start database - a database can be started in various modes specific to the database product such as "start without mirroring", etc.
- Stop database - a database can be stopped as a step in problem resolution.
- SQL*Net Listener As a method for communication with external systems (such as MobileLYNX). SQL*Net Listener can be started, stopped, or refreshed as a step in problem resolution.
- Show events queue - certain events can be scheduled or initiated by a database, and the current status of those events can be obtained as part of problem troubleshooting.
- SQL interface - a user may enter a Structured Query Language (SQL) command to interrogate an SQL-capable database, and view the results.
- SQL Structured Query Language
- View event log - systems can log events and transactions, which the user may display as a step in problem troubleshooting. [0057] These functions are well known to people skilled in the art. It is understood that additional functions may be utilized as well.
- the wireless device 22 implements the above- described menu system to allow users to remotely manage the computer network.
- the wireless device is adapted to interface to the application server 30.
- Common wireless devices include, but are not limited to, WAP-enabled mobile telephones, two-way pagers, and wireless enabled personal digital assistants (PDAs). These devices typically provide a user interface via a browser application 33 that is resident on the wireless device.
- the present invention is adapted to work in conjunction with an external system 34.
- external system 34 examples include network management systems (e.g., Tivoli, CA Unicenter, Openview), call center management systems (e.g., Remedy), or proprietary systems capable of communicating according to typical system-to-system protocols (e.g., XML-RPC, SOAP, Telnet, SNMP, SMTP).
- network management systems e.g., Tivoli, CA Unicenter, Openview
- call center management systems e.g., Remedy
- proprietary systems capable of communicating according to typical system-to-system protocols (e.g., XML-RPC, SOAP, Telnet, SNMP, SMTP).
- XML-RPC Simple Object Access Protocol
- the application server 30 is central to the present invention. It controls communication with the network devices and applications that are to be monitored.
- the application server 30 includes three primary components: 1) the controller 36; 2) renderers 38; and 3) models 40 corresponding to each renderer. Each of these components is described further below. It should be understood, however, that the present invention is preferably deployed via a software application.
- the software can be resident on a standalone server or it could be resident on an existing computer network server. Further, the software could even be resident on the wireless device or on the network devices. For example, it is entirely possible to have an agent running on a server and part of the agent includes software to implement the menu user interface.
- the preferred method and system is to use a standalone server to host the software and serve as the interface between the user and the computer network and the devices that comprise it.
- the software of the present invention can be contained on a floppy disk, CD Rom, or delivered to the customer over the Internet. All that is required is a carrier wave to transmit the software to the customer.
- the application server 30 is connected to network devices, generally designated 42, that comprise the computer network.
- network devices generally designated 42, that comprise the computer network.
- Examples of such devices include Unix servers, Linux servers, Microsoft NT network servers, web servers, Cisco routers, SQL-compliant databases, and Telnet-enabled devices.
- Communication protocols to the devices include, but are not limited to, Telnet, SNMP, and SOAP.
- renderers 38 and corresponding models 40 act cooperatively as a proxy with the network devices 42 for users that are remote from the computer network.
- the units collectively comprise the application server 30 and serve to provide the menu (proxy) interface that facilitates network management.
- the controller 36 is responsible for obtaining connection type context and interaction with the wireless device 22 (or in the event of a non-remote application, a computer terminal or laptop).
- the controller also determines which of the plurality of renderers to use and passes information to the renderer 38 in accordance with the request from the wireless device 22.
- the controller obtains results from the renderer 38 and delivers content to the connection type of the wireless device 22 (e.g., HTTP, WAP, XML-RPC, SNMP).
- the renderers 38 are responsible for determining how to present information according to the connection type of the wireless device 22, and thus the renderers are context sensitive.
- the renderer 38 also instantiates the appropriate method within the models 40 for interacting with the network devices 42.
- the renderer 38 also sends parameters to the model 40.
- the renderer 38 is programmed to perform business logic on results received from the device through model 40. The processed results are adjusted for context and sent to the controller 36.
- the renderer 38 therefore delivers the content to the connection type.
- the models 40 correspond to a particular renderer 38 and are associated with a network device 42.
- a model 40 receives parameters from a renderer 38 and obtains information from the database [#] of the application server 30.
- the database includes data pertaining to the network devices.
- the model 40 interacts with the network device 42 and obtains results from the device. The results (success or error) are sent to the associated renderer 38.
- FIG. 4 is a sequence diagram that illustrates the process.
- the vertical lines define areas of responsibility, or swimlanes, for the various devices and components.
- the user or external system is designated.
- the user submits a request for an action (preferably by choosing a menu item).
- the controller operates in the designated swimlane.
- the controller evaluates the context of the request from the user (typically a wireless device), captures parameters pertaining to the request, and chooses a particular renderer to perform the request, reflected at 66 in Figure 4.
- the renderer operates in the swimlane.
- the renderer captures the context of the request from the controller, as well as the parameters required for the designated action, and obtains session variables, as shown at 70.
- Session variables are maintained by the application server to make the system easier to use. Examples of session variables can include user name, server name, database instance name. Session variables may vary at any given moment depending on the module and function. Session variables are maintained so the user is not required to re-enter information on every screen.
- the renderer instantiates the model.
- the model operates in the corresponding swimlane and performs the action or request called for by the user (e.g., the wireless device), as shown at 76 in Figure 4.
- the network device operates in corresponding swimlane. The device performs the function called for by the model and returns a result to the model, as reflected at 80.
- the model obtains the result from the network device and sends it the renderer.
- the renderer evaluates the results, applies business logic to the results, determines the appropriate output (e.g., success or failure), and delivers context and content to the controller, as shown at 84.
- the controller delivers the results to the user browser that resides on the wireless or other device.
- the wireless device or computer displays the result at 88.
- FIG. 5 is a class diagram that further illustrates the renderer/model relationship. For clarity each combination of a renderer and a model is referred to as a module. Each module pertains to a particular device, e.g., a Cisco router, Linux server, and DSLAM. In Figure 5, "ModuleName" is substituted for the name of a device. As shown at 90, a module is comprised of a renderer and corresponding model. At 92, the "Renderer_ModelName.class is capable of rendering information according to a specific context (e.g., HTTP, WAP, XML). Examples of typical functions are menus, forms, and error messages (a more complete list appears earlier).
- a specific context e.g., HTTP, WAP, XML. Examples of typical functions are menus, forms, and error messages (a more complete list appears earlier).
- the functions depicted in the diagram are in the form of xxx(), where xxx is the function to be performed, and 0 indicate that parameters are to be passed to the function within the parentheses.
- the "Model_ModelName.class is capable of interacting with the device irrespective of context. Functions will likely vary by device, such as ping, get statistics, reboot, shut down services, and restart services (described above).
- the module also may include data stored in the application server database (described below), including attributes such as IP addresses, names, community strings, and associated groups. It should also be understood that programs written in languages native to the device environment (“shims”) can be written to access the device via native application program interfaces (APIs). Examples include DLLs and PERL.
- Models 40 are very specific to the device, while the renderer 38 provides the liaison to the device.
- the user may choose a function from a menu, say, "Restart FTP Service on Server". Although this is a single request on a menu, it may result in many steps, and it is the Tenderer's responsibility to determine what those steps are and to assure that those steps are performed by any necessary models successfully (i.e., "business logic").
- the renderer may instruct the model to perform:
- the renderer 38 will then format and send a "Successful restart" message to the user device, using the appropriate protocol (HTTP, WAP, etc).
- the renderer 38 may choose to use multiple device-specific models, e.g., the "Database” model and the "Server” model.
- a model must be constructed for every device, which will contain all the functions necessary to interact with the device.
- a renderer 38 must be constructed to contain all the functions a user may wish to perform on a device.
- One user function may utilize many models 40, as well as many functions within the models.
- the application server has an internal database in which it stores useful information for its operations.
- the database scheme below depicts the major tables and their relationships.
- the Groups table allows the user organization to categorize devices. These groups could be defined as geographic, device type, departmental, functional, or any other method the organization chooses. It is the Group table that allows users to use drill-down screens to find a particular device.
- the Group table contains fields such as:
- the Devices table contains all the devices to be managed by the application server. Devices can be hardware, such as servers and routers, or software applications such as Oracle databases.
- the Devices table contains fields such as:
- the Functions table contains the functions and default parameters used by devices.
- the Functions table contains fields such as:
- the Device Functions table is required to cross-reference devices and functions. Likewise, a specific device may require a specific parameter, and this table allows such customization.
- the Device Function table contains fields such as:
- the Person table contains information about the users of the application server.
- the Person table contains fields such as:
- the Permissions table contains information about which devices and functions the users are allowed to perform.
- the Permissions table contains fields such as:
- the Alerts table contains information about system alerts. Those alerts can be viewed by the users, and also contain links to associated devices so the user can access the device functions directly.
- the Alerts table contains fields such as:
- the Bulletins table contains information about general bulletins. The users, to obtain system-wide notifications, can view these bulletins.
- the Bulletins table contains fields such as:
- the referenced tables and fields are the most significant required by the application server 30. Additional tables can be added to provide additional cross- reference capabilities or improved system performance.
- the following example describes a user logging into the application, finding a router, and displaying the router's statistics.
- the user turns on the Internet-enabled wireless device 22, and accesses the device's wireless carrier network. Examples include PalmNet, Sprint, OmniSky, and Nextel.
- the user accesses the wireless application on the wireless device 22. On a WAP-enabled device, this may be a book-marked link on a menu. On a Palm-OS device, it may be an application icon.
- the user is presented with a login form, which contains fields for login validation such as user-id and password.
- the user fills in the fields and posts the data to the application by tapping or clicking the "Submit” button on the screen, as reflected at 62 in Figure 4.
- the wireless carrier for transmission through the wireless network encrypts the data.
- This encryption method is specific to the wireless carrier.
- the wireless carrier converts the wireless signal to an Internet message in its wireless-internet gateway server.
- the wireless carrier encrypts the Internet message via SSL, a widely accepted industry de-facto encryption method.
- the wireless carrier transmits the encrypted Internet message to the application server 30.
- the application server 30 resides in an organization's "DMZ", or the cable segment between the router accessing the Internet and the organization's firewall.
- the application server 30 accepts Internet messages only from the carrier wireless-internet gateway server. All other Internet messages are discarded. This provides a level of access security.
- the application server decrypts the message.
- the application server redirects the Internet message to the application server behind the computer network firewall using a specific and private port.
- the firewall is configured to allow inbound Internet traffic only from the application server 30 and only on the designated port. This maintains the integrity of the network's segregation of its public addresses from its private subnet IP addresses.
- the application server 30 receives the Internet message.
- the controller 36 evaluates the message, determining the context of the message including items such as protocol (e.g., HTTP, WAP), requested action (e.g., login), and associated parameters (e.g., fields such as user identification and password), as reflected at 66 in Figure 4.
- the controller 36 determines which renderer 38 is required, instantiates the renderer, and passes the information to the renderer. In this case, the renderer is responsible for the login process.
- the renderer 38 validates the user identification and password, as shown at 70 in Figure 4.
- the renderer instantiates the model 40.
- the renderer requests a validation of user identification and password from the model, as reflected at 72.
- the model looks up the user identification and password in the database and verifies that an exact match exists.
- the model 40 returns a success code to the renderer 38.
- the renderer 38 communicates with the model 40 to check the permissions table in the database to ascertain the level of authority the user is allowed.
- the model 40 accesses the database and returns the user's allowed permission levels to the renderer 38, as reflected at 76 in Figure 4.
- the database performs the queries requested by the model 40 and returns the results to the model 40, as shown at 80 in Figure 4.
- the model 40 returns the results to the renderer 38, as shown at 82 in Figure 4.
- the renderer 38 calls the model 40 to obtain the user's name.
- the model 40 accesses the database and returns the user's name, as reflected at 76 in Figure 4.
- the database performs the queries requested by the model 40 and returns the results to the model, as reflected at 80.
- the model 40 returns the results to the renderer 38, as shown at 82 in Figure 4.
- the renderer 38 stores the information obtained from the model 40 and Internet in session variables for the users.
- the renderer 38 formats a response message menu file for the user, using the protocol and user permissions, as shown at 84.
- the renderer 38 passes the message to the controller 36.
- the controller 36 transmits the message through the organization's firewall to the application server 30, as shown at 86 in Figure 4.
- the application server 30 encrypts the message using SSL.
- the application server 30 transmits the message to the user through the Internet.
- the wireless carrier accepts the message at the carrier wireless-internet gateway server and decrypts it. It immediately encrypts it again for wireless transmission.
- the wireless carrier transmits the message to the user.
- the user's device accepts the message, decrypts it, and displays it on the device screen. This is the "Main Menu,” as shown at 88 in Figure 4.
- the "Main Menu” accomplishes the following, it: 1) confirms successful login; and 2) displays a choice of menu items.
- the user wants to gather statistics from a particular router in Building 65. The user begins to find the router by choosing "Network Management" on the "Main Menu". This request for a menu posted to the application, as reflected at 62.
- the wireless carrier for transmission through the wireless network encrypts the data. This encryption method is specific to the wireless carrier.
- the wireless carrier converts the wireless signal to an Internet message in its wireless-internet gateway server.
- the wireless carrier encrypts the Internet message via SSL.
- the wireless carrier transmits the encrypted Internet message to the application server.
- the application server resides in an organization's "DMZ", or the cable segment between the router accessing the Internet and the organization's firewall 28.
- the application server 30 accepts Internet messages only from the carrier wireless-Internet gateway server. All other Internet messages are discarded. This provides a level of access security.
- the application server 30 decrypts the message.
- the application server 30 redirects the Internet message to the application server behind the organization's firewall using a specific and private port.
- the application server 30 receives the Internet message.
- the controller 36 evaluates the message, determining the context of the message including items such as protocol (e.g., HTTP, WAP), requested action (e.g., get_network_management_tnenu), and associated parameters (e.g., fields such as userid and password), as shown at 66.
- the controller 36 determines which renderer 38 is required, instantiates the renderer 38, and passes the information to the renderer 38.
- the renderer 38 is responsible for the "Network Management Menu" process, as shown at 70 in Figure 4.
- the renderer 38 instantiates the model 40, as shown at 72 in Figure 4.
- the renderer 38 calls the model 40 to determine what network management modules are installed on the application server 30.
- the model 40 accesses the database according to the criteria given it by the renderer 38, as shown at 76 in Figure 4.
- the database performs the queries requested by the model 40, and returns the results to the model 40, as shown at 80.
- the renderer 38 formats a response message containing the "Network Management Menu" file for the user, using the protocol and user permissions, as shown at 82 in Figure 4.
- the renderer passes the message to the controller 36, as shown at 84.
- the controller 36 transmits the message through the organization's firewall to the application server 30, as reflected at 86.
- the application server 30 encrypts the message using SSL.
- the application server 30 transmits the message to the user through the Internet.
- the wireless carrier accepts the message at the carrier wireless-Internet gateway server and decrypts it. It immediately encrypts it again for wireless transmission.
- the wireless carrier transmits the message to the user.
- the user's device accepts the message, decrypts it, and displays it on the device, as shown at 88 in Figure 4.
- the user is presented with the "Network Management Menu". On it, the user chooses from groups of routers, in this case "Building 65," as shown at 62.
- the wireless carrier for transmission through the wireless network encrypts the data. This encryption method is specific to the wireless carrier.
- the wireless carrier converts the wireless signal to an Internet message in its wireless- internet gateway server.
- the wireless carrier encrypts the Internet message via SSL.
- the wireless carrier transmits the encrypted Internet message to the application server.
- the application server resides in an organization's "DMZ", or the cable segment between the router accessing the Internet and the organization's firewall 28.
- the application server 30 accepts Internet messages only from the carrier wireless-internet gateway server. All other Internet messages are discarded. This provides a level of access security.
- the application server decrypts the message.
- the application server redirects the Internet message to the application server behind the organization's firewall 28 using a specific and private port.
- the application server 30 receives the Internet message.
- the controller 36 evaluates the message, determining the context of the message including items such as protocol (e.g., HTTP, WAP), requested action (e.g., get_device_list), and associated parameters (e.g., fields such as GroupName), as reflected at 66 in Figure 4.
- the controller 36 determines which renderer 38 is required, instantiates the renderer 38, and passes the information to the renderer 38.
- the renderer 38 is responsible for the obtaining the devices in the group "Building 65," as shown at 70 in Figure 4.
- the renderer 38 instantiates the model, as reflected at 72.
- the renderer 38 calls the model 40 to obtain a list of devices in the "Building 65" group that the user is allowed to manage.
- the model 40 accesses the database according to the criteria provided by the renderer 38, as reflected at 76.
- the database performs the queries requested by the model 40 and returns the results to the model, as shown at 80.
- the model 40 returns the results to the renderer 38, as reflected at 82.
- the renderer 38 formats a response message containing the "Building 65 Menu" file for the user, using the protocol and user permissions, as shown at 84 in Figure 4.
- the renderer 38 passes the message to the controller 36, as shown at 86.
- the controller 36 transmits the message through the organization's firewall to the application server 30.
- the application server 30 encrypts the message using SSL.
- the application server 30 transmits the message to the user through the Internet.
- the wireless carrier accepts the message at the carrier wireless-Internet gateway server and decrypts it. It immediately encrypts it again for wireless transmission.
- the wireless carrier transmits the message to the user.
- the user's device accepts the message, decrypts it, and displays it on the wireless device, as shown at 88.
- the user is presented with a list of routers in the "Building 65" group. The user finds the desired router and selects it, as reflected at 62 in Figure 4.
- the wireless carrier for transmission through the wireless network encrypts the data. This encryption method is specific to the wireless carrier.
- the wireless carrier converts the wireless signal to an Internet message in its wireless-Intemet gateway server.
- the wireless carrier encrypts the Intemet message via SSL.
- the wireless carrier transmits the encrypted Intemet message to the application server.
- the application server resides in an organization's "DMZ", or the cable segment between the router accessing the Intemet and the organization's firewall.
- the application server 30 accepts Internet messages only from the carrier wireless-Intemet gateway server. All other Internet messages are discarded. This provides a level of access security.
- the application server 30 decrypts the message.
- the apphcation server 30 redirects the Internet message to the application server behind the organization's firewall 28 using a specific and private port.
- the application server 30 receives the Internet message.
- the controller 36 evaluates the message, determining the context of the message including items such as protocol (e.g., HTTP, WAP), requested action (e.g., get_router_functions), and associated parameters (e.g., fields such as RouterName), as shown at 66 in Figure 4.
- the controller 36 determines which renderer 38 is required, instantiates the renderer 38, and passes the information to the renderer 38.
- the renderer is responsible for the building the "Router Functions Menu," as shown at 70.
- the renderer 38 instantiates the model, as shown at 72.
- the renderer 38 calls the model to obtain a list of functions for the specified router that the user is allowed to perform.
- the model 40 accesses the database according to the criteria given it by the renderer 38, as reflected at 76.
- the database performs the queries requested by the model 40, and returns the results to the model 40, as shown at 80 in Figure 4.
- the model 40 returns the results to the renderer 38, as reflected at 82.
- the renderer 38 formats a response message containing the "Router Functions Menu" file for the user, using the protocol and user permissions, as shown at 84 in Figure 4.
- the renderer 38 passes the message to the controller 36, as shown at 86.
- the controller 36 transmits the message through the organization's firewall 28 to the application server 30.
- the application server 30 encrypts the message using SSL.
- the application server 30 transmits the message to the user through the Internet.
- the wireless carrier accepts the message at the carrier wireless-Intemet gateway server and decrypts it. It immediately encrypts it again for wireless transmission.
- the wireless carrier transmits the message to the user.
- the user's device accepts the message, decrypts it, and displays it on the wireless device, as shown at 88 in Figure 4.
- the user is presented with a menu of all the functions the user is allowed to perform on the specified router.
- the user chooses "View Statistics" from the menu, as shown at 62.
- the wireless carrier for transmission through the wireless network encrypts the data.
- This encryption method is specific to the wireless carrier.
- the wireless carrier converts the wireless signal to an Internet message in its wireless-internet gateway server.
- the wireless carrier encrypts the Internet message via SSL.
- the wireless carrier transmits the encrypted Internet message to the application server.
- the application server 30 resides in an organization's "DMZ", or the cable segment between the router accessing the Internet and the organization's firewall 28.
- the application server 30 accepts Internet messages only from the carrier wireless-internet gateway server. All other Internet messages are discarded. This provides a level of access security.
- the application server 30 decrypts the message.
- the application server 30 redirects the Internet message to the application server behind the organization's firewall 28 using a specific and private port.
- the application server 30 receives the Intemet message.
- the controller 36 evaluates the message, determining the context of the message including items such as protocol (e.g., HTTP, WAP), requested action (e.g., get_router_statistics), and associated parameters (e.g., fields such as RouterName), as reflected at 66 in Figure 4.
- the controller 36 determines which renderer 38 is required, instantiates the renderer, and passes the information to the renderer 38.
- the renderer 38 is responsible ' for obtaining "Router Statistics," as shown at 70.
- the renderer 38 instantiates the model 40, as shown at 72.
- the renderer 38 instantiates the router model 40, as reflected at 72.
- the renderer 38 calls the model to obtain the connection method, login identification, and login password for the specified router.
- the model 40 accesses the database according to the criteria given it by the renderer 38, as shown at 76 in Figure 4.
- the database performs the queries requested by the model 40 and returns the results to the model 40.
- the access method 40 is Telnet, as shown at 80.
- the model 40 returns the results to the renderer 38, as shown at 82 in Figure 4.
- the renderer 38 calls the router model to obtain statistics from the specified router.
- the router model 40 uses Telnet to log into the router, as shown at 76.
- the router accepts the Telnet login, as shown at 80.
- the router model issues a Telnet command to query the router for its statistics, as reflected at 76.
- the router provides its statistics, as shown at 80.
- the router model returns the statistics data to the renderer 38, as shown at 82.
- the renderer 38 formats a response message containing the "Router Statistics" file for the user, using the wireless device protocol, as shown at 84 in Figure 4.
- the renderer 38 passes the message to the controller 36, as shown at 86.
- the controller transmits the message through the organization's firewall 28 to the application server 30.
- the application server 30 encrypts the message using SSL.
- the application server 30 transmits the message to the user through the Internet.
- the wireless carrier accepts the message at the carrier wireless-Intemet gateway server and decrypts it. It immediately encrypts it again for wireless transmission.
- the wireless carrier transmits the message to the user.
- the user's device accepts the message, decrypts it, and displays it on the wireless device 22.
- the user views the router statistics, as shown at 88 in Figure 4.
- the application server 30 is adapted to work in conjunction with a network management system (NMS), e.g., Tivoli or Openview.
- NMS network management system
- the NMS system monitors the computer network and generates an alert in the event a network condition occurs, typically a problem of some sort.
- the application server 30 is connected to the NMS system to receive the alert and the application server forwards the alert to the wireless device 22.
- the IT professional responds to the alert via the wireless device and the application server communicates with the NMS system to close the alert.
- FIG. 6 is a sequence diagram that reflects the process of the application server 30 working in conjunction with an NMS system.
- a device experiencing a problem operates in the swimlane.
- the problematic device generates an SNMP trap as a result of a negative event, as reflected at 92.
- the NMS system operates in the swimlane.
- the NMS system monitors the computer network and detects events. Depending on the event, the NMS will ignore it, log it, or generate an alert.
- the scenario under which the NMS system generates an alert is depicted.
- the alert triggers a script to generate XML RPC.
- the script is straightforward and can be written in a variety of languages, e.g. PERL.
- the XML contains pertinent attributes such as the device name, IP address, problem description, and alert ID number, as reflected at 98.
- the application server 30 operates in the swimlane. It detects the incoming XML, parses it, and authenticates that it came from an approved source, as reflected at 102.
- the application server 30 posts the alert to its database.
- the IT professional/user operates in swimlane, and in conjunction with a wireless device, queries the list of alerts and views the alert, shown at 106.
- the user performs remedial actions applicable to the network device 42 that are made available by the menu system sent by the application server 30, as reflected at 108.
- the user closes the alert.
- the application server updates its database and generates any of a number of message types: SNMP trap; network API specific to the NMS system; or proprietary format compatible with a daemon running on a custom NMS platform. Commonly, the application server 30 will generate an SNMP trap.
- the NMS system receives the SNMP trap, and triggers a script.
- the script closes the alert.
- a router experiences an abnormal activity, as reflected at 92 in Figure 6.
- the NMS detects the event and, due to the threshold rules configured within the NMS, the NMS generates an alert.
- a script is triggered, as shown at 96 in Figure 6.
- the script is written in any common scripting languages such as PERL.
- the script creates an XML document containing pertinent information. Such information can include the timestamp, the router name, assigned technician, the fault description, severity codes, and current status.
- the XML is transmitted to the application server 30 via a remote procedure call such as XML RPC or SOAP, which are de-facto industry standards for system-to-system interactivity. This event is reflected at 98 in Figure 6.
- the application server 30 1) detects the incoming remote procedure call; 2) parses the contents of the remote procedure call; and 3) authenticates that the NMS is the authorized source of the remote procedure call. (An attempted remote procedure call from an unauthorized source is logged as an attempted breach and set aside for analysis by system administrators). These events are reflected at 102 in Figure 6.
- the application server 30 logs the alert in its database, using the information contained in the XML document.
- the alert record is also associated with: 1) the assigned technician (user); and 2) the server in trouble within the database.
- the associated user information can include a preferred notification code (e.g., no immediate notification, text page, email, etc.) and notification address (e.g., pager number, e-mail address.)
- the associated server information includes its name, address, connection method (e.g. SNMP, Telnet), and its associated services. These events are reflected at 103 in Figure 6.
- the assigned technician views the alert.
- the user can proactively view a queue of assigned alerts.
- the user can be automatically informed of the alert via a text page or e-mail depending on the capability of the user's wireless device, as reflected at 106 in Figure 6.
- the user resolves the problem on the router by viewing the router's statistics to determine if further action is required (described above), as reflected at 108 in Figure 6.
- the user closes the alert, indicating the remedy performed, as shown at 110 in Figure 6.
- the application changes the status of the alert in its database to be closed, updating the record with a timestamp, user identification, and remedy code.
- the application server 30 sends a message to the NMS indicating that the alert has been closed.
- the format of the message can be any type compatible with the NMS system.
- a format common to many NMS systems is an SNMP Trap. These events are shown at 112 in Figure 6.
- the NMS receives the message, in this case an SNMP trap,- from the application server 30 in a routine fashion, i.e., as if the application server is like any other device within the purview of the NMS, as reflected at 114 in Figure 6.
- the NMS responds to the message by closing its alert, as shown at 116 in Figure 6.
- the present invention also includes a secure interface between the application server 30 and wireless devices that remotely access the application server.
- the security software/firewall 28 is preferably resident on the application server 30.
- the security focuses on two main issues: encryption (hiding the information being transmitted) and authentication (the user is authorized to use the wireless device 22 and the wireless device 22 is, in fact, communicating with the application server 30 and not another device masquerading as the application server).
- access to the application server can be limited to a finite set of users who will have to enter a usemame and a password to gain access into any part of the system where critical information or critical functions are maintained.
- Devices such as a cell phone or Palm PDA have a unique serial number that is sent with every transaction. This serial number can be used to limit which devices have access to the application server.
- an RSA SecurlD feature is added.
- the RSA ACE/Server works with RSA SecurlD tokens to authenticate the identity of users, granting access only to authorized users on valid RSA ACE/ Agents.
- the agents run on top of the application server 30, as is well known in the art.
- the RSA SecurlD tokens are small, handheld devices containing a microprocessor that calculates and displays unpredictable codes. These codes change at a specified interval, typically 60 seconds.
- the user of the device In order to gain access to the system, the user of the device must have the token/card in hand and must also know a secret PIN number assigned to the token/card. This is called Two-factor User authentication because it requires a secret, memorized personal identification number (PIN) and the current code generated by the token assigned to the user. Because the generated code expires after 60 seconds, the code is not reusable, so someone knowing both the PIN and the generated code has only 60 seconds in which to use it.
- biometrics could be use, e.g., a fingerprint or other DNA identification.
- the security system also includes restrictions. When a restriction is placed on the server, this means that access to the server is limited to a set number of people or devices. A restriction by itself does not make a system secure, but adds another layer of security.
- a gateway restriction can also be implemented, which restricts the devices from which the application server can accept requests. For example, if a client was using only PalmNet's Network for wireless devices, the application server can be set to accept connections only from PalmNet's gateway.
- Server restrictions can also be used.
- the first server accepts calls from the devices and then forwards the requests to the application server that is protected behind a firewall.
- the first server can be set to allow only traffic from the PDA's gateway (mentioned above) while the second can " be limited to only accept traffic/requests from the first server.
- a 128-bit SSL Server ID is a digital certificate.
- a client can present a certificate electronically to prove identity or right to access information online. Users are able to submit sensitive information to the system with the assurance that they are doing business with the application server and not an impostor's "spoof," and that the information which they are sending is not intercepted or decrypted by a third party.
- the digital certificate binds the identity of the organization to a pair of electronic keys that can be used to encrypt and sign digital information.
- a certificate makes it possible to verify someone's claim that they have the right to use a given key, helping to prevent people from using phony keys to impersonate other users.
- CA Certification Authority
Landscapes
- Engineering & Computer Science (AREA)
- Human Computer Interaction (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer And Data Communications (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephone Function (AREA)
Abstract
Description
Claims
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU2002307111A AU2002307111A1 (en) | 2001-04-06 | 2002-04-05 | A user interface for computer network management |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09/828,702 | 2001-04-06 | ||
US09/828,702 US20030069848A1 (en) | 2001-04-06 | 2001-04-06 | A User interface for computer network management |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2002082215A2 true WO2002082215A2 (en) | 2002-10-17 |
WO2002082215A3 WO2002082215A3 (en) | 2003-02-27 |
Family
ID=25252517
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2002/010588 WO2002082215A2 (en) | 2001-04-06 | 2002-04-05 | A user interface for computer network management |
Country Status (3)
Country | Link |
---|---|
US (1) | US20030069848A1 (en) |
AU (1) | AU2002307111A1 (en) |
WO (1) | WO2002082215A2 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2006077195A1 (en) * | 2005-01-20 | 2006-07-27 | International Business Machines Corporation | Workflow anywhere: invocation of workflows from a remote device |
EP2690842A1 (en) * | 2012-07-25 | 2014-01-29 | Ricoh Company, Ltd. | Device management apparatus, device management system, and computer-readable storage medium |
Families Citing this family (43)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7466663B2 (en) * | 2000-10-26 | 2008-12-16 | Inrotis Technology, Limited | Method and apparatus for identifying components of a network having high importance for network integrity |
US20020161872A1 (en) * | 2001-04-26 | 2002-10-31 | Pontoppidan Thue M. | Network management |
US8700781B2 (en) * | 2001-06-12 | 2014-04-15 | Verizon Business Global Llc | Automated processing of service requests using structured messaging protocols |
US20020188688A1 (en) * | 2001-06-12 | 2002-12-12 | Bice Richard S. | Automated message handling system and process |
US7756963B2 (en) * | 2001-07-05 | 2010-07-13 | PEER Intellectual Property, Inc. | Automated tool management in a multi-protocol environment |
US7962622B2 (en) * | 2001-08-07 | 2011-06-14 | Motorola Mobility, Inc. | System and method for providing provisioning and upgrade services for a wireless device |
US7243163B1 (en) | 2001-08-07 | 2007-07-10 | Good Technology, Inc. | System and method for full wireless synchronization of a data processing apparatus with a messaging system |
US7444676B1 (en) * | 2001-08-29 | 2008-10-28 | Nader Asghari-Kamrani | Direct authentication and authorization system and method for trusted network of financial institutions |
US20030145106A1 (en) * | 2002-01-31 | 2003-07-31 | Sun Microsystems, Inc. | System and method for directing wireless data packet traffic |
US7133804B2 (en) | 2002-02-22 | 2006-11-07 | First Data Corporatino | Maintenance request systems and methods |
US7174017B2 (en) * | 2002-03-04 | 2007-02-06 | Lenovo Singapore Pte, Ltd | Decryption system for encrypted audio |
US20030196084A1 (en) * | 2002-04-12 | 2003-10-16 | Emeka Okereke | System and method for secure wireless communications using PKI |
US7606882B2 (en) * | 2002-05-13 | 2009-10-20 | Ricoh Co., Ltd. | Method for obtaining an identifier of a monitored device |
JP3617981B2 (en) * | 2002-06-17 | 2005-02-09 | 株式会社東芝 | Information terminal control method and control information transmitter |
US7809813B2 (en) * | 2002-06-28 | 2010-10-05 | Microsoft Corporation | System and method for providing content-oriented services to content providers and content consumers |
FR2842969B1 (en) * | 2002-07-25 | 2004-12-17 | Cit Alcatel | IMPROVED DATA PROCESSING DEVICE AND METHOD FOR GENERATING ALARMS WITHIN A COMMUNICATION NETWORK |
US7545925B2 (en) * | 2002-12-06 | 2009-06-09 | At&T Intellectual Property I, L.P. | Method and system for improved routing of repair calls to a call center |
US8190893B2 (en) | 2003-10-27 | 2012-05-29 | Jp Morgan Chase Bank | Portable security transaction protocol |
US20060080555A1 (en) * | 2004-10-12 | 2006-04-13 | Mitac Technology Corp. | Data synchronization systems and methods for PDAS |
US20060089147A1 (en) * | 2004-10-21 | 2006-04-27 | Beaty Robert M | Mobile network infrastructure for applications, personalized user interfaces, and services |
US20060146353A1 (en) * | 2004-12-30 | 2006-07-06 | Microsoft Corporation | Strategies for rendering job information using a multi-personality driver device |
JP2006227919A (en) * | 2005-02-17 | 2006-08-31 | Fuji Xerox Co Ltd | Device and method for supplying commodity information |
US8701175B2 (en) * | 2005-03-01 | 2014-04-15 | Tavve Software Company | Methods, devices, systems and computer program products for providing secure communications between managed devices in firewall protected areas and networks segregated therefrom |
US20060244755A1 (en) * | 2005-04-28 | 2006-11-02 | Microsoft Corporation | Pre-rendering conversion of graphical data |
US20080195897A1 (en) * | 2006-05-12 | 2008-08-14 | David Alaniz | Methods, Systems, and Computer-Readable Media for Assisting in Troubleshooting |
US20080072036A1 (en) * | 2006-08-22 | 2008-03-20 | Thomas Rudolf Anzelde | Apparatus and method for enhancing complexity in user-selected password |
US8065429B2 (en) * | 2007-06-28 | 2011-11-22 | Nokia Corporation | System, apparatus and method for associating an anticipated success indication with data delivery |
WO2009146739A2 (en) * | 2008-06-03 | 2009-12-10 | Telefonaktiebolaget Lm Ericsson (Publ) | Identifying user role in ip multimedia subsystem |
US8578034B2 (en) * | 2010-11-24 | 2013-11-05 | Verizon Patent And Licensing Inc. | Optimized network device discovery |
JP6016371B2 (en) * | 2012-02-03 | 2016-10-26 | シャープ株式会社 | Notification system, notification method, and server device |
JP2013210911A (en) * | 2012-03-30 | 2013-10-10 | Fuji Xerox Co Ltd | Information processing device, information processing system and program |
US9954845B2 (en) * | 2013-01-09 | 2018-04-24 | Ventus Networks Llc | Multi-user multi-router network management method and system |
US20140359742A1 (en) * | 2013-05-30 | 2014-12-04 | ClearStory Data Inc. | Apparatus and Method for Agent Based Ingestion of Data |
US9495436B2 (en) | 2013-05-30 | 2016-11-15 | ClearStory Data Inc. | Apparatus and method for ingesting and augmenting data |
WO2015109172A1 (en) * | 2014-01-17 | 2015-07-23 | Pitroda Satyan G | System and method for electronic vault to manage digital contents |
CN103879157B (en) * | 2014-01-20 | 2016-10-05 | 珠海艾派克微电子有限公司 | Parameter sending method, storage chip and the imaging cartridge of imaging cartridge storage chip |
US9652442B1 (en) | 2014-01-24 | 2017-05-16 | Google Inc. | Virtual photo wall |
US9912824B2 (en) | 2014-02-10 | 2018-03-06 | Xerox Corporation | Triggering workflows from a multifunction device |
US10708130B2 (en) | 2015-08-28 | 2020-07-07 | Hewlett-Packard Development Company, L.P. | Common management frameworks |
US10461942B1 (en) * | 2016-07-20 | 2019-10-29 | United Services Automobile Association | Multi-factor authentication with code rotation |
US10269073B1 (en) * | 2018-03-29 | 2019-04-23 | Arbitrage Technologies | Systems and methods for interpreting exchange data packets using a lookup table |
US11409871B1 (en) * | 2019-03-22 | 2022-08-09 | Ca, Inc. | Universal tracing of side-channel processes in computing environments |
JP2025006117A (en) * | 2023-06-29 | 2025-01-17 | キヤノン株式会社 | REMOTE SYSTEM, METHOD, AND PROGRAM - Patent application |
Family Cites Families (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5394433A (en) * | 1993-04-22 | 1995-02-28 | International Business Machines Corporation | Frequency hopping pattern assignment and control in multiple autonomous collocated radio networks |
US6070243A (en) * | 1997-06-13 | 2000-05-30 | Xylan Corporation | Deterministic user authentication service for communication network |
US6421714B1 (en) * | 1997-10-14 | 2002-07-16 | Lucent Technologies | Efficient mobility management scheme for a wireless internet access system |
US6449638B1 (en) * | 1998-01-07 | 2002-09-10 | Microsoft Corporation | Channel definition architecture extension |
US6360257B1 (en) * | 1998-01-30 | 2002-03-19 | Telefonaktiebolaget L M Ericsson (Publ) | Managing group IP addresses in mobile end stations |
US6477543B1 (en) * | 1998-10-23 | 2002-11-05 | International Business Machines Corporation | Method, apparatus and program storage device for a client and adaptive synchronization and transformation server |
US6356282B2 (en) * | 1998-12-04 | 2002-03-12 | Sun Microsystems, Inc. | Alarm manager system for distributed network management system |
US6397256B1 (en) * | 1999-01-27 | 2002-05-28 | International Business Machines Corporation | Monitoring system for computers and internet browsers |
US6401085B1 (en) * | 1999-03-05 | 2002-06-04 | Accenture Llp | Mobile communication and computing system and method |
US6741855B1 (en) * | 2000-03-24 | 2004-05-25 | Sun Microsystems, Inc. | Method and apparatus for remotely managing data via a mobile device |
-
2001
- 2001-04-06 US US09/828,702 patent/US20030069848A1/en not_active Abandoned
-
2002
- 2002-04-05 AU AU2002307111A patent/AU2002307111A1/en not_active Abandoned
- 2002-04-05 WO PCT/US2002/010588 patent/WO2002082215A2/en not_active Application Discontinuation
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2006077195A1 (en) * | 2005-01-20 | 2006-07-27 | International Business Machines Corporation | Workflow anywhere: invocation of workflows from a remote device |
US7467197B2 (en) | 2005-01-20 | 2008-12-16 | International Business Machines Corporation | Workflow anywhere: invocation of workflows from a remote device |
EP2690842A1 (en) * | 2012-07-25 | 2014-01-29 | Ricoh Company, Ltd. | Device management apparatus, device management system, and computer-readable storage medium |
JP2014041591A (en) * | 2012-07-25 | 2014-03-06 | Ricoh Co Ltd | Equipment management device, equipment management system, and program |
Also Published As
Publication number | Publication date |
---|---|
US20030069848A1 (en) | 2003-04-10 |
AU2002307111A1 (en) | 2002-10-21 |
WO2002082215A3 (en) | 2003-02-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20030069848A1 (en) | A User interface for computer network management | |
US7418597B2 (en) | Apparatus for accepting certificate requests and submission to multiple certificate authorities | |
US10116626B2 (en) | Cloud based logging service | |
US6981041B2 (en) | Apparatus and accompanying methods for providing, through a centralized server site, an integrated virtual office environment, remotely accessible via a network-connected web browser, with remote network monitoring and management capabilities | |
US8572254B2 (en) | Systems and methods for establishing and validating secure network sessions | |
US8548916B2 (en) | Managing passwords used when detecting information on configuration items disposed on a network | |
US20040003084A1 (en) | Network resource management system | |
US20070088759A1 (en) | Network Update Manager | |
KR100402094B1 (en) | Remote control system using web and icon | |
WO2005096550A1 (en) | A method for achieving the small window at client-side in the broadband data intelligent network | |
US7349957B1 (en) | Network management method and tool | |
JP2002229870A (en) | Server trouble monitoring system | |
US20060048198A1 (en) | Establishing remote connections | |
WO2007038338A2 (en) | Systems and methods for establishing and validating secure network sessions |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A2 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ OM PH PL PT RO RU SD SE SG SI SK SL TJ TM TN TR TT TZ UA UG US UZ VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A2 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
AK | Designated states |
Kind code of ref document: A3 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ OM PH PL PT RO RU SD SE SG SI SK SL TJ TM TN TR TT TZ UA UG US UZ VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A3 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |
|
122 | Ep: pct application non-entry in european phase | ||
NENP | Non-entry into the national phase |
Ref country code: JP |
|
WWW | Wipo information: withdrawn in national office |
Country of ref document: JP |