-
公开(公告)号:US20200220873A1
公开(公告)日:2020-07-09
申请号:US16243700
申请日:2019-01-09
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Badrish Havaralu Rama Chandra Adiga , Balaji Sankaran , Vinay Kumar Vishwakarma , Krishna Mohan Elluru , Shantha Kumara
IPC: H04L29/06
Abstract: Example approaches for authenticating a device are described, In an example, a category, from a plurality of categories, is identified for a device, based on data packets exchanged between the device and a network element. The category is indicative of operational capabilities of the device. Based on the category identified for the device, an authentication order for the device is determined. The authentication order is indicative of a sequence in which a set of authentication tests is to be executed for authentication of the device.
-
公开(公告)号:US11546217B1
公开(公告)日:2023-01-03
申请号:US17475289
申请日:2021-09-14
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Vinay Kumar Vishwakarma , Dinesh Pulivalam Ramakrishnan , Vinitha Harimoorthy , Elango Kumarasamy
IPC: G06F15/173 , H04L41/0866
Abstract: One aspect of the instant application facilitates detection of configuration anomaly. During operation, a system can convert a set of rules associated with configuration syntax information for a feature in a respective feature document to at least a structured regular expression. Then the system generates a set of configuration templates with a respective configuration template including the structured regular expression corresponding to the feature document. The system can select, based on a target configuration associated with the network device, a subset of the configuration templates and can extract, based on a match between the selected configuration templates and the target configuration, a set of features. The system can determine one or more rules associated with the extracted features. Based on the one or more rules the system can determine an anomaly in the target configuration and generate at least one recommended configuration to alleviate the anomaly.
-
公开(公告)号:US11258794B2
公开(公告)日:2022-02-22
申请号:US16243700
申请日:2019-01-09
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Badrish Havaralu Rama Chandra Adiga , Balaji Sankaran , Vinay Kumar Vishwakarma , Krishna Mohan Elluru , Shantha Kumara
Abstract: Example approaches for authenticating a device are described. In an example, a category, from a plurality of categories, is identified for a device, based on data packets exchanged between the device and a network element. The category is indicative of operational capabilities of the device. Based on the category identified for the device, an authentication order for the device is determined. The authentication order is indicative of a sequence in which a set of authentication tests is to be executed for authentication of the device.
-
-