WO2022016391A1 - Generating an audio message at a network device in response to detection of a network event - Google Patents
Generating an audio message at a network device in response to detection of a network event Download PDFInfo
- Publication number
- WO2022016391A1 WO2022016391A1 PCT/CN2020/103338 CN2020103338W WO2022016391A1 WO 2022016391 A1 WO2022016391 A1 WO 2022016391A1 CN 2020103338 W CN2020103338 W CN 2020103338W WO 2022016391 A1 WO2022016391 A1 WO 2022016391A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- network device
- audio
- network
- broadcasting
- audio alarm
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/141—Denial of service attacks against endpoints in a network
Definitions
- the subject matter of the present disclosure relates generally to detecting a network event and generating an audio message at a network device in response to detecting the network event.
- the difficulty of managing a network is directly proportional to its complexity. As networks grow in complexity, so too does the difficulty of managing the network. Alarms provide feedback that network processes or network elements themselves are not functioning as intended. However, alarms are communicated using LEDs, log files, or email. Such alarms are often missed by network managers responsible for maintaining the network the first time an alarm triggering event occurs.
- An aspect of the present disclosure involves detecting a network event and generating an audio message at a network device in response to detecting the network event.
- a network device is configured via a user interface to generate an audio message associated with detection of an event.
- a management tool monitors the network device to detect events.
- the management tool may include a network manager, a database of management information describing objects defining events of the network device, and a network agent.
- the network agent monitors the objects of the network device to detect an event based on the objects described in the database of management information.
- the network agent sends an indication of an event to the network manager. Events are entered into in the database of management information.
- the network manager may trigger the generation of the audio message.
- the audio message is received at an audio device of the network device that includes a speaker and is broadcast using the speaker.
- the audio message may be an audio alarm message that indicates that an abnormal status of the network device was detected, that a parental control rule was triggered, or that an attempt was made by hackers to invade the network device.
- the audio message may also be an audible announcement of the service set identifier and password.
- a firewall may be provided, wherein a firewall setting may be presented in a user interface.
- the user interface allows navigation to a speaker parameter selection page.
- an interface may be presented for enabling or disabling the audio alarm; and to select an audio message class, such as all, normal, or custom.
- the custom class allows the user to select the alarm type to use.
- Fig. 1 is a schematic diagram of a system implementing the network device.
- Fig. 2 illustrates a network device.
- Fig. 3 is a diagram of a management tool.
- Fig. 4 is a diagram illustrating a user interface to manage audio messages.
- Fig. 5 illustrates a user interface to manage the audio message types provided to the speaker.
- Fig. 6 is a flow chart illustrating generation of an audio message in response to detecting a network event.
- Fig. 1 is a schematic diagram of a system implementing the network device.
- the main elements of the system include a network device 102 connected to the Internet 106 via an Internet Service Provider (ISP) 101 and also connected to different wireless devices such as wireless extenders 103 and client devices 104.
- the system shown in Fig. 1 includes wireless devices (e.g., wireless extenders 103 and client devices 104) that may be connected in one or more wireless networks (e.g., private, guest, iControl, backhaul network, or Internet of things (IoT) network) within the system. Additionally, there could be some overlap between wireless devices (e.g., wireless extenders 103 and client devices 104) in the different networks. That is, one or more network devices could be located in more than one network.
- the wireless extenders 103 could be located both in a private network for providing content and information to a client device 104 and also included in a backhaul network or an iControl network.
- the ISP 101 can be, for example, a streaming video provider or any computer for connecting the network device 102 to the Internet 106.
- the connection 114 between the Internet 106 and the ISP 101 and the connection 113 between the ISP 101 and the network device 102 can be implemented using a wide area network (WAN) , a virtual private network (VPN) , metropolitan area networks (MANs) , system area networks (SANs) , a DOCSIS network, a fiber optics network (e.g., FTTH (fiber to the home) or FTTX (fiber to the x) , or hybrid fiber-coaxial (HFC) ) , a digital subscriber line (DSL) , a public switched data network (PSDN) , a global Telex network, or a 2G, 3G, 4G or 5G network, for example.
- WAN wide area network
- VPN virtual private network
- MANs metropolitan area networks
- SANs system area networks
- DOCSIS network e.g., FT
- connection 113 can further include as some portion thereof a broadband mobile phone network connection, an optical network connection, or other similar connections.
- the connection 113 can also be implemented using a fixed wireless connection that operates in accordance with, but is not limited to, 3rd Generation Partnership Project (3GPP) Long Term Evolution (LTE) or 5G protocols.
- 3GPP 3rd Generation Partnership Project
- LTE Long Term Evolution
- 5G protocols 5rd Generation Partnership Project
- connection 113 is capable of providing connections between the network device 102 and a WAN, a LAN, a VPN, MANs, PANs, WLANs, SANs, a DOCSIS network, a fiber optics network (e.g., FTTH, FTTX, or HFC) , a PSDN, a global Telex network, or a 2G, 3G, 4G or 5G network, for example.
- the network device 102 can be, for example, a hardware electronic device that may be a combination modem and gateway device that combines the functions of a modem, an access point, and/or a router for providing content received from the content provider 101 to network devices (e.g., wireless extenders 103 and client devices 104) in the system. It is also contemplated by the present disclosure that the network device 102 can include the function of, but is not limited to, an Internet Protocol/Quadrature Amplitude Modulator (IP/QAM) set-top box (STB) or smart media device (SMD) that is capable of decoding audio/video content, and playing over-the-top (OTT) or multiple system operator (MSO) provided content.
- IP/QAM Internet Protocol/Quadrature Amplitude Modulator
- STB Internet Protocol/Quadrature Amplitude Modulator
- SMD smart media device
- OTT over-the-top
- MSO multiple system operator
- connection 109 between the network device 102, the wireless extenders 103, and client devices 104 can be implemented using a wireless connection in accordance with any IEEE 802.11 Wi-Fi protocols, Bluetooth protocols, Bluetooth Low Energy (BLE) , or other short range protocols that operate in accordance with a wireless technology standard for exchanging data over short distances using any licensed or unlicensed band such as the citizens broadband radio service (CBRS) band, 2.4 GHz bands, 5 GHz bands, or 6 GHz bands.
- CBRS citizens broadband radio service
- the connection 109 can be implemented using a wireless connection that operates in accordance with, but is not limited to, RF4CE protocol, ZigBee protocol, Z-Wave protocol, or IEEE 802.15.4 protocol. It is also contemplated by the present disclosure that the connection 109 can include connections to a media over coax (MoCA) network.
- MoCA media over coax
- One or more of the connections 109 can also be a wired Ethernet connection.
- the wireless extenders 103 can be, for example, hardware electronic devices such as access points used to extend the wireless network by receiving the signals transmitted by the network device 102 and rebroadcasting the signals to, for example, client devices 104, which may out of range of the network device 102.
- the wireless extenders 103 can also receive signals from the client devices 104 and rebroadcast the signals to the network device 102, or other client devices 104.
- connection 111 between the wireless extenders 103 and the client devices 104 are implemented through a wireless connection that operates in accordance with any IEEE 802.11 Wi-Fi protocols, Bluetooth protocols, Bluetooth Low Energy (BLE) , or other short range protocols that operate in accordance with a wireless technology standard for exchanging data over short distances using any licensed or unlicensed band such as the CBRS band, 2.4 GHz bands, 5 GHz bands, or 6 GHz bands.
- the connection 111 can be implemented using a wireless connection that operates in accordance with, but is not limited to, RF4CE protocol, ZigBee protocol, Z-Wave protocol, or IEEE 802.15.4 protocol.
- one or more of the connections 111 can be a wired Ethernet connection.
- the client devices 104 can be, for example, hand-held computing devices, personal computers, electronic tablets, smart phones, smart speakers, IoT devices, iControl devices, portable music players with smart capabilities capable of connecting to the Internet, cellular networks, and interconnecting with other devices via Wi-Fi and Bluetooth, or other wireless hand-held consumer electronic devices capable of executing and displaying content received through the network device 102. Additionally, the client devices 104 can be a TV, an IP/QAM STB or an SMD that is capable of decoding audio/video content and playing over OTT or MSO provided content received through the network device 102.
- connection 110 between the network device 102 and the client device 104 is implemented through a wireless connection that operates in accordance with, but is not limited to, any IEEE 802.11 protocols. Additionally, the connection 110 between the network device 102 and the client device 104 can also be implemented through a WAN, a LAN, a VPN, MANs, PANs, WLANs, SANs, a DOCSIS network, a fiber optics network (e.g., FTTH, FTTX, or HFC) , a PSDN, a global Telex network, or a 2G, 3G, 4G or 5G network, for example.
- connection 110 can also be implemented using a wireless connection in accordance with Bluetooth protocols, Bluetooth Low Energy (BLE) , or other short range protocols that operate in accordance with a wireless technology standard for exchanging data over short distances using any licensed or unlicensed band such as the CBRS band, 2.4 GHz bands, 5 GHz bands, or 6 GHz bands.
- BLE Bluetooth Low Energy
- One or more of the connections 110 can also be a wired Ethernet connection.
- the network device 102, the wireless extenders 103, and the client devices 104 shown in Fig. 1 will be provided in the discussion of Fig 2.
- the network device 102, the wireless extenders 103, and the client devices 104 include electronic components or electronic computing devices operable to receive, transmit, process, store, and/or manage data and information associated with the system, which encompasses any suitable processing device adapted to perform computing tasks consistent with the execution of computer-readable instructions stored in a memory or a computer-readable recording medium.
- any, all, or some of the computing components in the network device 102, the wireless extenders 103, and the client devices 104 may be adapted to execute any operating system, including Linux, UNIX, Windows, MacOS, DOS, and ChromOS as well as virtual machines adapted to virtualize execution of a particular operating system, including customized and proprietary operating systems.
- the network device 102, the wireless extenders 103, and the client devices 104 are further equipped with components to facilitate communication with other computing devices over the one or more network connections to local and wide area networks, wireless and wired networks, public and private networks, and any other communication network enabling communication in the system.
- Fig. 2 illustrates a network device 200.
- the network device 200 includes a user interface 210, a processor 220, an audio device 230, a network manager 240 (e.g., a management tool) , and memory 250.
- the network device 200 also includes a network interface 260 for connecting one or more client device (s) 270, for example, using a wireless local area network 280, such as Wi-Fi.
- the network manager 240 may be implemented using software elements (e.g., code embodied on a machine-readable medium) or hardware elements.
- processor 220 may be configured to execute instructions 222 stored on said memory 250 to cause said network device 200 to provide the network manager 240 and user interface 210.
- the processor 220 may thus execute the processes carried out by the network manager 240.
- Communication between the components (e.g., 210, 220, 230, 240, 250, 260) of the network device 200 may be established using an internal bus 290.
- the network device 200 may constitute either software elements (e.g., code embodied on a machine-readable medium) or hardware elements.
- a “hardware element” is a tangible unit capable of performing certain operations and may be configured or arranged in a certain physical manner.
- one or more computer systems e.g., a standalone computer system, a client computer system, or a server computer system
- one or more hardware elements of a computer system e.g., a processor or a group of processors
- software e.g., an application or application portion
- the network manager 240 monitors the network 280 and connections by client device (s) 270.
- the network manager 240 detects an event 242 and generates an audio message 244.
- the audio message 244 may be selected by the network manager 240 from audio files 252 stored in memory 250.
- the network manager 240 selects an appropriate audio file 252 that is appropriate for the event 242 detected by the network manager 240.
- the audio message 244 is provided to audio device 230.
- Audio device 230 processes the audio message into an analog signal that may be emitted by speaker 232.
- the audio message 244 may be a digital audio message that is converted into an analog signal 232 by signal processing 234, which may need to be amplified before transmitted to the speaker 236.
- Signal processing 234 may be implemented by processor 220.
- Speaker 236 receives the analog signal 232 and converts the analog signal to audio waves 238 that are perceptible by a user.
- Audio message 244 may be an audio message that provides data to the user. Alternatively, or in addition to, the audio message 244 may provide warnings in the form of audio alarm messages.
- the speaker 236 may provide audio alarms that indicate an abnormal status of the network device 200, e.g., the network device 200 failed to start, an Internet connection was lost, a high temperature condition of processor 220 exist.
- the network manager 240 may also detect cyberattacks, such as a denial of service (DoS) attack and issue an alarm that indicates a particular cyberattack has taken place.
- DoS denial of service
- the audio message 244 may be a parental control violation audio alarm that indicates, for example, that a child tried to access some blocked websites, or tried to access the Internet during an unallowed period.
- the audio message 244 may be an audio alarm that indicates that someone has tried to hack into the home Wi-Fi network 260.
- the network manager 240 may determine that multiple, different Wi-Fi passwords attempts have been made.
- an authorize user may request identification of the name of the network, i.e., the service set identification (SSID) and password, and the network manager 240 may broadcast an audio message 244 that identifies the name of the network (SSID) and the password.
- SSID service set identification
- Other features could also use the speaker 236 to perform other functions.
- User interface 210 may include a graphic user interface (GUI) 212.
- the GUI 212 may be used to configure different settings tbr network manager 240.
- the configuration settings accessible via the GUI 212 may be provided by files stored in memory 250.
- the configuration files stored in memory 250 may include an application 214, a Multiple System Operators (MSO) file 215, a Management Information Base (MIB) file 216, a Technical Report-069 (TR-069) file 217, etc.
- An application 214 may be downloaded and stored in memory 250.
- the application 214 may provide for network fault monitoring by network manager 240.
- MSO files 215 may be provided by one or more cable television systems to configure different components, such as network manager 240.
- MIBs 216 provide a database that is used for managing the entities in a network, such as network device 200 and client device (s) 270.
- MIBs 216 include information about standard network information, such as IP addresses, network interface settings, and Simple Network Management Protocol (SNMP) definitions.
- SNMP may be used to manage network resources.
- SNMP allows for creation of SNMP traps and conversion into alerts for managing the network device 200.
- Notifications, such as alert messages are sent from a remote device, e.g., network device 200, client device (s) 270, to a central collector, such as network manager 240.
- TR-069 provides for the communication between a client device and an Auto-Configuration Server (ACS) .
- ACS Auto-Configuration Server
- the network manager 240 may also broadcast a SSID and password message 272 to client device 270 that is running a mobile application 274. For example, a guest may want to connect to the private SSID.
- Mobile application 274 may communicate with network manager 240, and if authorization is granted, the network manager 240 may cause the SSID and password message 272 to be sent to the mobile application 274.
- GUI 212 may be used to implement firewall level settings. GUI 212 may display a page that allows navigation to a page for configuration of the speaker 236. The GUI 212 may then be used to enable/disable audio messages by the speaker 236. In addition, the GUI 212 may be used to select which class to use: All/Normal/Custom. The default value may be chosen to be the normal configuration and alarm types selected for the normal configuration may be used. Selection of custom class allows the user may select the alarm type to use for any particular event 242.
- Fig. 3 is a diagram of a management tool 300.
- the management tool 300 includes a network manager 310, database of management information 320, e.g., MIB, and network agents 330.
- the network manager 310 manages the client devices by accessing the database of management information 320, e.g., MIB.
- the database of management intbrmation 320 includes a collection of managed objects that may be accessed using network-management protocols, e.g., SNMP.
- a network agent 330 monitors objects included in the database of management information 320.
- the network agent 330 detects events associated with the objects and sends notifications and data to the network manager 310.
- the events are logged by the network agent 330 into the database of management information 320.
- the network manager 310 receives the notifications and collects data from the network agents 330.
- the network agent 330 sends alerts called traps and answers requests that were sent by the network manager 310.
- the network manager 310 captures and decodes the traps.
- the network manager 310 may also request specific information from the network agent 330. Information is passed through requests and replies with the use of the MIB 320.
- the network manager 310 is responsible for decoding the packets and providing an interface to an administrator.
- the GUI 212 may be used to provide an interface for managing and configuring the management tool 300.
- Fig. 4 is a diagram illustrating a user interface 400 to manage audio messages
- the user interface 400 includes an area for page navigation 410.
- a main web page 410 for configuration of a network device is provided.
- the main web page provides firewall settings 412 and a selection 414 for navigating to a hardware parameter selection page 420.
- the hardware parameter selection page 420 includes selections for hardware choices 422 and a selection 424 for navigating to a speaker parameter selection page 430.
- Speaker parameter selection page 430 include options for setting speaker parameters 432.
- User interface 400 also includes a sub-interface for controlling audio messages 440.
- the user may select to enable audio messages 442 or may select to disable audio messages 444.
- User interface further includes a sub-interface for selecting a speaker class to use 450.
- the user may select All 452, Normal 454, and Custom 456.
- the default value may be chosen to be the normal configuration 454 where alarm types selected for the normal configuration may be used.
- the user selects custom class 456, which allows the user may to select the alarm type to use for any particular event. Once a selection is made, the audio message types may be selected, as described in further detail with reference to Fig. 5
- Fig. 5 illustrates a user interface 500 to manage the audio message types provided to the speaker.
- the first message type 510 is for an audio alarm message indicating an abnormal status of the network device.
- the user may select to generate an audio alarm message reporting the system failed to start via checking the status for system key interfaces of the network device (e.g., eRouter/eCM) 512.
- the user may generate an audio alarm message reporting that an Internet connection was lost 514 as determined, for example, by pinging the WAN side of an eRouter and determining that the WAN side is not responding.
- the first audio alarm message type 510 may include an audio alarm message reporting a high temperature once the CPU temperature exceeds a predetermined value 516.
- the second type of audio alarm message 520 includes audio alarm messages that indicate parental control rules have triggered an alarm.
- the second type of audio alarm message 520 may include an audio alarm message that is triggered by a child trying to access some blocked websites or by a child trying to access the Internet during an unallowed time 522.
- the second type of audio alarm message 520 may also include an audio alarm message stating that the firewall logs should be checked to detect whether rules have been triggered and reporting the status 524.
- the third type of audio message 530 includes audio alarm messages that indicate hackers have attempted to invade the network.
- the third type of audio alarm message 530 may include an audio alarm message warning that someone has been continuously trying different Wi-Fi passwords to attempt to connect to a private SSID 532.
- the third type of audio alarm message 530 may also include an audio alarm message stating that DoS attacks have been detected by the firewall 534.
- the fourth type of audio message 540 includes audio messages that broadcast the SSID/password for the network.
- the fourth type of audio message 540 may include an audio message announcing the SSID and password for the network 542 that is generated by a guest requesting connection to the network and the system determines the guest is authorized to access the network.
- the SSID and password for the network may be broadcast to the network device and/or to a mobile application 542. This message type 540 is enabled by the owner of the network.
- Fig. 6 is a flow chart 600 illustrating generation of an audio message in response to detecting a network event.
- Fig. 6 it is assumed that the network device includes software stored in memory, which when executed perform functions and operations of the subject matter of the present disclosure.
- method 600 starts (S602) , and the network device is configured via a user interface to generate an audio message associated with detection of an event (S610) .
- user interface 210 may include a graphic user interface (GUI) 212.
- GUI graphic user interface
- the GUI 212 may be used to configure different settings for network manager 240.
- the configuration settings accessible via the GUI 212 may be provided by files stored in memory 250.
- the network manager 240 monitors the network to detect an event 242 and generates an audio message 244.
- the audio message 244 may be selected by the network manager 240 from audio files 252 stored in memory 250.
- Management commands are initiated by the network manager (S614) .
- the network manager 240 may begin to monitor the network 280 and connections by client device (s) 270.
- the network manager 240 may detect an event 242 and generates an audio message 244.
- Monitoring notifications are received by the network manager from an object of the network device (S618) .
- a network agent 330 monitors objects and sends notifications to the network manager 310.
- the network manager 310 collects data sent from the network agents 330.
- the database of management information 320 includes a collection of managed objects that may be accessed using network-management protocols, e.g., SNMP.
- the objects of the network device are monitored by a network agent to detect events based on the objects described in the database of management information (S626) .
- the network agent 330 monitors objects included in the database of management information 320.
- An indication of the event is sent by the network agent to the network manager (S630) .
- the network agent 330 detects events associated with the objects and sends notifications and data to the network manager 310.
- the network manager 310 receives the notifications and collects data from the network agents 330.
- the events are logged by the network agent into the database of management information (S634) .
- the events are logged by the network agent 330 into the database of management information 320.
- An audio message is generated by the network manager upon receiving the indication of the event is received from the network agent (S638) .
- the network manager 240 detects an event 242 and generates an audio message 244.
- the audio message 244 may be selected by the network manager 240 from audio files 252 stored in memory 250.
- the network manager 240 selects an appropriate audio file 252 that is appropriate for the event 242 detected by the network manager 240.
- the audio message is received at an audio device (e.g., a network device 200 and/or client device 270 running a mobile application 274) (S642) .
- the audio message is played using the speaker (S646) .
- speaker 236 receives the analog signal 232 and converts the analog signal to audio waves 238 that are perceptible by a user.
- the processes discussed in this disclosure may be implemented in hardware, software, or a combination thereof.
- the described operations represent computer-executable instructions stored on one or more non-transitory computer readable recording medium that, when executed by one or more hardware processors, perform the recited operations.
- computer-executable instructions include routines, programs, objects, components, data structures, and the like that perform particular functions or implement particular abstract data types.
- Subject matter of the present disclosure may be provided as a computer program product including one or more non-transitory computer readable recording medium having stored thereon instructions (in compressed or uncompressed form) that may be used to program a computer (or other electronic device) to perform processes or methods described herein.
- the computer-readable storage media may include one or more of an electronic storage medium, a magnetic storage medium, an optical storage medium, a quantum storage medium, or the like.
- the computer-readable storage media may include, but are not limited to, hard drives, floppy diskettes, optical disks, read-only memories (ROMs) , random access memories (RAMs) , erasable programmable ROMs (EPROMs) , electrically erasable programmable ROMs (EEPROMs) , flash memory, magnetic or optical cards, solid-state memory devices, or other types of physical media suitable for storing electronic instructions.
- ROMs read-only memories
- RAMs random access memories
- EPROMs erasable programmable ROMs
- EEPROMs electrically erasable programmable ROMs
- flash memory magnetic or optical cards
- solid-state memory devices solid-state memory devices
- machine-readable signals whether modulated using a carrier or unmodulated, include, but are not limited to, signals that a computer system or machine hosting or running a computer program may be configured to access, including signals transferred by one or more networks.
- a transitory machine-readable signal may comprise transmission of software by the Internet.
- phrases “capable of, ” “capable to, ” “operable to, ” or “configured to” refers to some apparatus, logic, hardware, and/or element designed in such a way to enable use of the apparatus, logic, hardware, and/or element in a specified manner.
- the subject matter of the present disclosure is provided as examples of apparatus, systems, methods, and programs for performing the features described in the present disclosure. However, further features or variations are contemplated in addition to the features described above. It is contemplated that the implementation of the components and functions of the present disclosure can be done with any newly arising technology that may replace any of the above implemented technologies.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Telephonic Communication Services (AREA)
Abstract
A network device for providing an audio alarm by a network device. A user interface is used to configure the network device to generate an audio message associated with detection of an event. The network device using a management tool to detect the event. The management tool triggers generation of the audio message in response to detection of the event. An audio device that includes a speaker receives the audio message. The audio message is broadcast using the speaker.
Description
The subject matter of the present disclosure relates generally to detecting a network event and generating an audio message at a network device in response to detecting the network event.
The difficulty of managing a network is directly proportional to its complexity. As networks grow in complexity, so too does the difficulty of managing the network. Alarms provide feedback that network processes or network elements themselves are not functioning as intended. However, alarms are communicated using LEDs, log files, or email. Such alarms are often missed by network managers responsible for maintaining the network the first time an alarm triggering event occurs.
SUMMARY
An aspect of the present disclosure involves detecting a network event and generating an audio message at a network device in response to detecting the network event.
A network device is configured via a user interface to generate an audio message associated with detection of an event. A management tool monitors the network device to detect events. The management tool may include a network manager, a database of management information describing objects defining events of the network device, and a network agent. The network agent monitors the objects of the network device to detect an event based on the objects described in the database of management information. The network agent sends an indication of an event to the network manager. Events are entered into in the database of management information.
Upon receiving the indication of an event from the network agent, the network manager may trigger the generation of the audio message. The audio message is received at an audio device of the network device that includes a speaker and is broadcast using the speaker. The audio message may be an audio alarm message that indicates that an abnormal status of the network device was detected, that a parental control rule was triggered, or that an attempt was made by hackers to invade the network device. The audio message may also be an audible announcement of the service set identifier and password.
A firewall may be provided, wherein a firewall setting may be presented in a user interface. The user interface allows navigation to a speaker parameter selection page. On the speaker parameter page, an interface may be presented for enabling or disabling the audio alarm; and to select an audio message class, such as all, normal, or custom. The custom class allows the user to select the alarm type to use.
BRIEF SUMMARY OF THE DRAWINGS
The detailed description is set forth with reference to the accompanying figures. In the figures, the left-most digit (s) of a reference number identifies the figure in which the reference number first appears. The use of the same reference numbers in different figures indicates similar or identical items or features.
Fig. 1 is a schematic diagram of a system implementing the network device.
Fig. 2 illustrates a network device.
Fig. 3 is a diagram of a management tool.
Fig. 4 is a diagram illustrating a user interface to manage audio messages.
Fig. 5 illustrates a user interface to manage the audio message types provided to the speaker.
Fig. 6 is a flow chart illustrating generation of an audio message in response to detecting a network event.
While implementations are described herein by way of example, those skilled in the art will recognize that the implementations are not limited to the examples or figures described. It is understood that the figures and detailed description thereto are not intended to limit implementations to the particular form disclosed but, on the contrary, the intention is to cover modifications, equivalents, and alternatives falling within the spirit and scope as defined by the appended claims. The headings used herein are for organizational purposes and are not meant to be used to limit the scope of the description or the claims. As used throughout this application, the word “may” is used in a permissive sense (i.e., meaning having the potential to) , rather than the mandatory sense (i.e., meaning must) . Similarly, the words “include, ” “including, ” and “includes” mean including, but not limited to.
Fig. 1 is a schematic diagram of a system implementing the network device.
As shown in Fig. 1, the main elements of the system include a network device 102 connected to the Internet 106 via an Internet Service Provider (ISP) 101 and also connected to different wireless devices such as wireless extenders 103 and client devices 104. The system shown in Fig. 1 includes wireless devices (e.g., wireless extenders 103 and client devices 104) that may be connected in one or more wireless networks (e.g., private, guest, iControl, backhaul network, or Internet of things (IoT) network) within the system. Additionally, there could be some overlap between wireless devices (e.g., wireless extenders 103 and client devices 104) in the different networks. That is, one or more network devices could be located in more than one network. For example, the wireless extenders 103 could be located both in a private network for providing content and information to a client device 104 and also included in a backhaul network or an iControl network.
Starting from the top of Fig. 1, the ISP 101 can be, for example, a streaming video provider or any computer for connecting the network device 102 to the Internet 106. The connection 114 between the Internet 106 and the ISP 101 and the connection 113 between the ISP 101 and the network device 102 can be implemented using a wide area network (WAN) , a virtual private network (VPN) , metropolitan area networks (MANs) , system area networks (SANs) , a DOCSIS network, a fiber optics network (e.g., FTTH (fiber to the home) or FTTX (fiber to the x) , or hybrid fiber-coaxial (HFC) ) , a digital subscriber line (DSL) , a public switched data network (PSDN) , a global Telex network, or a 2G, 3G, 4G or 5G network, for example.
The connection 113 can further include as some portion thereof a broadband mobile phone network connection, an optical network connection, or other similar connections. For example, the connection 113 can also be implemented using a fixed wireless connection that operates in accordance with, but is not limited to, 3rd Generation Partnership Project (3GPP) Long Term Evolution (LTE) or 5G protocols. It is also contemplated by the present disclosure that connection 113 is capable of providing connections between the network device 102 and a WAN, a LAN, a VPN, MANs, PANs, WLANs, SANs, a DOCSIS network, a fiber optics network (e.g., FTTH, FTTX, or HFC) , a PSDN, a global Telex network, or a 2G, 3G, 4G or 5G network, for example.
The network device 102 can be, for example, a hardware electronic device that may be a combination modem and gateway device that combines the functions of a modem, an access point, and/or a router for providing content received from the content provider 101 to network devices (e.g., wireless extenders 103 and client devices 104) in the system. It is also contemplated by the present disclosure that the network device 102 can include the function of, but is not limited to, an Internet Protocol/Quadrature Amplitude Modulator (IP/QAM) set-top box (STB) or smart media device (SMD) that is capable of decoding audio/video content, and playing over-the-top (OTT) or multiple system operator (MSO) provided content.
The connection 109 between the network device 102, the wireless extenders 103, and client devices 104 can be implemented using a wireless connection in accordance with any IEEE 802.11 Wi-Fi protocols, Bluetooth protocols, Bluetooth Low Energy (BLE) , or other short range protocols that operate in accordance with a wireless technology standard for exchanging data over short distances using any licensed or unlicensed band such as the citizens broadband radio service (CBRS) band, 2.4 GHz bands, 5 GHz bands, or 6 GHz bands. Additionally, the connection 109 can be implemented using a wireless connection that operates in accordance with, but is not limited to, RF4CE protocol, ZigBee protocol, Z-Wave protocol, or IEEE 802.15.4 protocol. It is also contemplated by the present disclosure that the connection 109 can include connections to a media over coax (MoCA) network. One or more of the connections 109 can also be a wired Ethernet connection.
The wireless extenders 103 can be, for example, hardware electronic devices such as access points used to extend the wireless network by receiving the signals transmitted by the network device 102 and rebroadcasting the signals to, for example, client devices 104, which may out of range of the network device 102. The wireless extenders 103 can also receive signals from the client devices 104 and rebroadcast the signals to the network device 102, or other client devices 104.
The connection 111 between the wireless extenders 103 and the client devices 104 are implemented through a wireless connection that operates in accordance with any IEEE 802.11 Wi-Fi protocols, Bluetooth protocols, Bluetooth Low Energy (BLE) , or other short range protocols that operate in accordance with a wireless technology standard for exchanging data over short distances using any licensed or unlicensed band such as the CBRS band, 2.4 GHz bands, 5 GHz bands, or 6 GHz bands. Additionally, the connection 111 can be implemented using a wireless connection that operates in accordance with, but is not limited to, RF4CE protocol, ZigBee protocol, Z-Wave protocol, or IEEE 802.15.4 protocol. Also, one or more of the connections 111 can be a wired Ethernet connection.
The client devices 104 can be, for example, hand-held computing devices, personal computers, electronic tablets, smart phones, smart speakers, IoT devices, iControl devices, portable music players with smart capabilities capable of connecting to the Internet, cellular networks, and interconnecting with other devices via Wi-Fi and Bluetooth, or other wireless hand-held consumer electronic devices capable of executing and displaying content received through the network device 102. Additionally, the client devices 104 can be a TV, an IP/QAM STB or an SMD that is capable of decoding audio/video content and playing over OTT or MSO provided content received through the network device 102.
The connection 110 between the network device 102 and the client device 104 is implemented through a wireless connection that operates in accordance with, but is not limited to, any IEEE 802.11 protocols. Additionally, the connection 110 between the network device 102 and the client device 104 can also be implemented through a WAN, a LAN, a VPN, MANs, PANs, WLANs, SANs, a DOCSIS network, a fiber optics network (e.g., FTTH, FTTX, or HFC) , a PSDN, a global Telex network, or a 2G, 3G, 4G or 5G network, for example.
The connection 110 can also be implemented using a wireless connection in accordance with Bluetooth protocols, Bluetooth Low Energy (BLE) , or other short range protocols that operate in accordance with a wireless technology standard for exchanging data over short distances using any licensed or unlicensed band such as the CBRS band, 2.4 GHz bands, 5 GHz bands, or 6 GHz bands. One or more of the connections 110 can also be a wired Ethernet connection.
A detailed description of the exemplary internal components of the network device 102, the wireless extenders 103, and the client devices 104 shown in Fig. 1 will be provided in the discussion of Fig 2. However, in general, it is contemplated by the present disclosure that the network device 102, the wireless extenders 103, and the client devices 104 include electronic components or electronic computing devices operable to receive, transmit, process, store, and/or manage data and information associated with the system, which encompasses any suitable processing device adapted to perform computing tasks consistent with the execution of computer-readable instructions stored in a memory or a computer-readable recording medium.
Further, any, all, or some of the computing components in the network device 102, the wireless extenders 103, and the client devices 104 may be adapted to execute any operating system, including Linux, UNIX, Windows, MacOS, DOS, and ChromOS as well as virtual machines adapted to virtualize execution of a particular operating system, including customized and proprietary operating systems. The network device 102, the wireless extenders 103, and the client devices 104 are further equipped with components to facilitate communication with other computing devices over the one or more network connections to local and wide area networks, wireless and wired networks, public and private networks, and any other communication network enabling communication in the system.
Fig. 2 illustrates a network device 200.
In Fig. 2, the network device 200 includes a user interface 210, a processor 220, an audio device 230, a network manager 240 (e.g., a management tool) , and memory 250. The network device 200 also includes a network interface 260 for connecting one or more client device (s) 270, for example, using a wireless local area network 280, such as Wi-Fi.
The network manager 240 may be implemented using software elements (e.g., code embodied on a machine-readable medium) or hardware elements. For example, processor 220 may be configured to execute instructions 222 stored on said memory 250 to cause said network device 200 to provide the network manager 240 and user interface 210. The processor 220 may thus execute the processes carried out by the network manager 240. Communication between the components (e.g., 210, 220, 230, 240, 250, 260) of the network device 200 may be established using an internal bus 290.
Certain subject matter of the present disclosure is described herein as including logic or a number of components, units, elements, or mechanisms. The network device 200 may constitute either software elements (e.g., code embodied on a machine-readable medium) or hardware elements. A “hardware element” is a tangible unit capable of performing certain operations and may be configured or arranged in a certain physical manner. In various example, one or more computer systems (e.g., a standalone computer system, a client computer system, or a server computer system) or one or more hardware elements of a computer system (e.g., a processor or a group of processors) may be configured by software (e.g., an application or application portion) as a hardware element that operates to perform certain operations as described herein.
The network manager 240 monitors the network 280 and connections by client device (s) 270. The network manager 240 detects an event 242 and generates an audio message 244. The audio message 244 may be selected by the network manager 240 from audio files 252 stored in memory 250. The network manager 240 selects an appropriate audio file 252 that is appropriate for the event 242 detected by the network manager 240. The audio message 244 is provided to audio device 230. Audio device 230 processes the audio message into an analog signal that may be emitted by speaker 232. For example, the audio message 244 may be a digital audio message that is converted into an analog signal 232 by signal processing 234, which may need to be amplified before transmitted to the speaker 236. Signal processing 234 may be implemented by processor 220. Speaker 236 receives the analog signal 232 and converts the analog signal to audio waves 238 that are perceptible by a user.
The audio message 244 may be a parental control violation audio alarm that indicates, for example, that a child tried to access some blocked websites, or tried to access the Internet during an unallowed period. The audio message 244 may be an audio alarm that indicates that someone has tried to hack into the home Wi-Fi network 260. For example, the network manager 240 may determine that multiple, different Wi-Fi passwords attempts have been made. Further, an authorize user may request identification of the name of the network, i.e., the service set identification (SSID) and password, and the network manager 240 may broadcast an audio message 244 that identifies the name of the network (SSID) and the password. Other features could also use the speaker 236 to perform other functions.
Fig. 3 is a diagram of a management tool 300.
In Fig. 3, the management tool 300 includes a network manager 310, database of management information 320, e.g., MIB, and network agents 330. The network manager 310 manages the client devices by accessing the database of management information 320, e.g., MIB. The database of management intbrmation 320 includes a collection of managed objects that may be accessed using network-management protocols, e.g., SNMP. A network agent 330 monitors objects included in the database of management information 320. The network agent 330 detects events associated with the objects and sends notifications and data to the network manager 310. The events are logged by the network agent 330 into the database of management information 320. The network manager 310 receives the notifications and collects data from the network agents 330. The network agent 330 sends alerts called traps and answers requests that were sent by the network manager 310. The network manager 310 captures and decodes the traps. The network manager 310 may also request specific information from the network agent 330. Information is passed through requests and replies with the use of the MIB 320. The network manager 310 is responsible for decoding the packets and providing an interface to an administrator. The GUI 212 may be used to provide an interface for managing and configuring the management tool 300.
Fig. 4 is a diagram illustrating a user interface 400 to manage audio messages
In Fig. 4, the user interface 400 includes an area for page navigation 410. A main web page 410 for configuration of a network device is provided. The main web page provides firewall settings 412 and a selection 414 for navigating to a hardware parameter selection page 420. The hardware parameter selection page 420 includes selections for hardware choices 422 and a selection 424 for navigating to a speaker parameter selection page 430. Speaker parameter selection page 430 include options for setting speaker parameters 432.
Fig. 5 illustrates a user interface 500 to manage the audio message types provided to the speaker.
In Fig. 5, four different audio message types 510, 520, 530, 540 are shown. The first message type 510 is for an audio alarm message indicating an abnormal status of the network device. Under the first audio alarm message type 510, the user may select to generate an audio alarm message reporting the system failed to start via checking the status for system key interfaces of the network device (e.g., eRouter/eCM) 512. The user may generate an audio alarm message reporting that an Internet connection was lost 514 as determined, for example, by pinging the WAN side of an eRouter and determining that the WAN side is not responding. Also, the first audio alarm message type 510 may include an audio alarm message reporting a high temperature once the CPU temperature exceeds a predetermined value 516.
The second type of audio alarm message 520 includes audio alarm messages that indicate parental control rules have triggered an alarm. The second type of audio alarm message 520 may include an audio alarm message that is triggered by a child trying to access some blocked websites or by a child trying to access the Internet during an unallowed time 522. The second type of audio alarm message 520 may also include an audio alarm message stating that the firewall logs should be checked to detect whether rules have been triggered and reporting the status 524.
The third type of audio message 530 includes audio alarm messages that indicate hackers have attempted to invade the network. The third type of audio alarm message 530 may include an audio alarm message warning that someone has been continuously trying different Wi-Fi passwords to attempt to connect to a private SSID 532. The third type of audio alarm message 530 may also include an audio alarm message stating that DoS attacks have been detected by the firewall 534.
The fourth type of audio message 540 includes audio messages that broadcast the SSID/password for the network. The fourth type of audio message 540 may include an audio message announcing the SSID and password for the network 542 that is generated by a guest requesting connection to the network and the system determines the guest is authorized to access the network. The SSID and password for the network may be broadcast to the network device and/or to a mobile application 542. This message type 540 is enabled by the owner of the network.
Fig. 6 is a flow chart 600 illustrating generation of an audio message in response to detecting a network event.
In Fig. 6, it is assumed that the network device includes software stored in memory, which when executed perform functions and operations of the subject matter of the present disclosure. In Fig. 6, method 600 starts (S602) , and the network device is configured via a user interface to generate an audio message associated with detection of an event (S610) . Referring to the description of the network device 200 in Fig. 2, user interface 210 may include a graphic user interface (GUI) 212. The GUI 212 may be used to configure different settings for network manager 240. The configuration settings accessible via the GUI 212 may be provided by files stored in memory 250. The network manager 240 monitors the network to detect an event 242 and generates an audio message 244. The audio message 244 may be selected by the network manager 240 from audio files 252 stored in memory 250.
Management commands are initiated by the network manager (S614) . For example, referring again to the description of the network device 200 in Fig. 2, the network manager 240 may begin to monitor the network 280 and connections by client device (s) 270. The network manager 240 may detect an event 242 and generates an audio message 244. Monitoring notifications are received by the network manager from an object of the network device (S618) . A network agent 330 monitors objects and sends notifications to the network manager 310. The network manager 310 collects data sent from the network agents 330.
Events of the network device are described by objects stored in the database of management information (S622) . Referring to the description of management tool 300 in Fig. 3, the database of management information 320 includes a collection of managed objects that may be accessed using network-management protocols, e.g., SNMP.
The objects of the network device are monitored by a network agent to detect events based on the objects described in the database of management information (S626) . Referring to the description of management tool 300 in Fig. 3, the network agent 330 monitors objects included in the database of management information 320.
An indication of the event is sent by the network agent to the network manager (S630) . The network agent 330 detects events associated with the objects and sends notifications and data to the network manager 310. The network manager 310 receives the notifications and collects data from the network agents 330.
The events are logged by the network agent into the database of management information (S634) . Referring again to the description of management tool 300 in Fig. 3, the events are logged by the network agent 330 into the database of management information 320.
An audio message is generated by the network manager upon receiving the indication of the event is received from the network agent (S638) . Referring again to the description of the network device 200 in Fig. 2, the network manager 240 detects an event 242 and generates an audio message 244. The audio message 244 may be selected by the network manager 240 from audio files 252 stored in memory 250. The network manager 240 selects an appropriate audio file 252 that is appropriate for the event 242 detected by the network manager 240.
The audio message is received at an audio device (e.g., a network device 200 and/or client device 270 running a mobile application 274) (S642) . The audio message is played using the speaker (S646) . Referring again to the description of the network device 200 in Fig. 2, speaker 236 receives the analog signal 232 and converts the analog signal to audio waves 238 that are perceptible by a user.
The processes discussed in this disclosure may be implemented in hardware, software, or a combination thereof. In the context of software, the described operations represent computer-executable instructions stored on one or more non-transitory computer readable recording medium that, when executed by one or more hardware processors, perform the recited operations. Generally, computer-executable instructions include routines, programs, objects, components, data structures, and the like that perform particular functions or implement particular abstract data types. Those having ordinary skill in the art will readily recognize that certain steps or operations illustrated in the figures above may be eliminated, combined, or performed in an alternate order. Any steps or operations may be performed serially or in parallel. Furthermore, the order in which the operations are described is not intended to be construed as a limitation.
Subject matter of the present disclosure may be provided as a computer program product including one or more non-transitory computer readable recording medium having stored thereon instructions (in compressed or uncompressed form) that may be used to program a computer (or other electronic device) to perform processes or methods described herein. The computer-readable storage media may include one or more of an electronic storage medium, a magnetic storage medium, an optical storage medium, a quantum storage medium, or the like. For example, the computer-readable storage media may include, but are not limited to, hard drives, floppy diskettes, optical disks, read-only memories (ROMs) , random access memories (RAMs) , erasable programmable ROMs (EPROMs) , electrically erasable programmable ROMs (EEPROMs) , flash memory, magnetic or optical cards, solid-state memory devices, or other types of physical media suitable for storing electronic instructions. Further, subject matter of the present disclosure may also be provided as a computer program product including a transitory machine-readable signal (in compressed or uncompressed form) . Examples of machine-readable signals, whether modulated using a carrier or unmodulated, include, but are not limited to, signals that a computer system or machine hosting or running a computer program may be configured to access, including signals transferred by one or more networks. For example, a transitory machine-readable signal may comprise transmission of software by the Internet.
Separate instances of these programs can be executed on or distributed across any number of separate computer systems. Thus, although certain steps have been described as being performed by certain devices, software programs, processes, or entities, this need not be the case. A variety of alternative implementations will be understood by those having ordinary skill in the art.
Use of the phrases “capable of, ” “capable to, ” “operable to, ” or “configured to” , refers to some apparatus, logic, hardware, and/or element designed in such a way to enable use of the apparatus, logic, hardware, and/or element in a specified manner. The subject matter of the present disclosure is provided as examples of apparatus, systems, methods, and programs for performing the features described in the present disclosure. However, further features or variations are contemplated in addition to the features described above. It is contemplated that the implementation of the components and functions of the present disclosure can be done with any newly arising technology that may replace any of the above implemented technologies.
Additionally, those having ordinary skill in the art readily recognize that the techniques described above can be utilized in a variety of devices, environments, and situations. Although the subject matter has been described in language specific to structural features or methodological acts, it is to be understood that the subject matter defined in the appended claims is not necessarily limited to the specific features or acts described. Rather, the specific features and acts are disclosed as exemplary forms of implementing the claims.
Claims (20)
- A network device, comprising:a user interface for configuring the network device to generate an audio message associated with detection of an event;a memory;a speaker; anda processor configured to execute instructions stored on said memory to cause said network device to:monitor the network device to detect the event;trigger generation of the audio message in response to the detecting of the event; andbroadcast the audio message using the speaker.
- The network device of claim 1, wherein:the memory has stored thereon a database of management information describing objects defining events of the network device;the processor is further configured to execute the instructions stored on said memory to cause said network device to:initiate management commands and receive monitoring notifications from an object of the network device;monitor the objects of the network device to detect the event based on the objects described in the database of management information;send an indication of the event to the network manager;log the events in the database of management information, andgenerate the audio upon receiving the indication of the network event.
- The network device of claim 1, wherein the processor is further configured to execute the instructions stored on said memory to cause said network device to broadcast an audio message indicating at least one of:an abnormal status of the network device was detected,a parental control rule was triggered.an attempt by hackers to invade the network device, andthe service set identifier and password, wherein the broadcast of the audio message further comprises broadcasting the service set identifier and password to a mobile application.
- The network device of claim 3, wherein the broadcast of the audio message comprises broadcast of an audio alarm message indicating the abnormal status of the network device was detected, wherein the broadcast of the audio alarm message indicating the abnormal status of the network further comprises broadcasting an audio alarm message indicating at least one of the network device failed to start based on a key system interface status, an IP connection was lost once a ping of a WAN side of the network device fails, and the temperature of the processor exceeds a predetermine high temperature level.
- The network device of claim 3, wherein the broadcast of the audio message comprises broadcast of an audio alarm message indicating the parental control rule was triggered, wherein the broadcast of the audio alarm message indicating the parental control rule was triggered further comprises broadcasting at least one of an audio alarm message that an attempt to access a block website was detected, an audio alarm message that an attempt to access the Internet occurred at a blocked time, and an audio alarm message that a firewall logs indicate at least one rule were violated.
- The network device of claim 3, wherein the broadcast of the audio message comprises broadcast of an audio alarm message indicating an attempt by hackers to invade the network device, wherein the broadcast of the audio alarm message indicating an attempt by hackers to invade the network device further comprises broadcasting an audio alarm message indicating that attempts to connect to a private service set identifier using a plurality of different incorrect passwords or broadcasting an audio alarm message indicating a denial of service (DoS) attack detected by a firewall.
- The network device of claim 1 further comprising a firewall setting presented through accessing a web page associated with the user interface, and navigating from a main web page to hardware parameter selection page and then to a speaker parameter selection page, wherein the speaker parameter selection page includes an interface for enabling or disabling the audio alarm, and an interface to select one of all, normal, or custom class, wherein the custom class allows the user to select the alarm type to use.
- The network device of claim 1, wherein the user interface is provided by at least one selecting from the group consisting of an audio alarm application, a network management tool, a configuration file, and TR-069, the user interface further comprising a graphical user interface (GUI) for management of the audio messages.
- The network device of claim 1, wherein the audio message broadcast using the speaker comprises a voice speaking at least one word.
- A method for providing an audio alarm by a network device, comprising:configuring the network device via a user interface to generate an audio message associated with detection of an event;monitoring the network device, using a management tool, to detect the event;triggering, by the management tool, generation of the audio message in response to the detecting of the event;receiving the audio message at an audio device of the network device that includes a speaker; andbroadcasting the audio message using the speaker.
- The method of claim 10, wherein the management tool comprises a network manager, a database of management information describing objects defining events of the network device, and a network agent, wherein the method further comprises:initiating, by the network manager, management commands;receiving, by the network manager, monitoring notifications from an object of the network device;describing, by objects stored in the database of management information, events of the network device;monitoring, by a network agent, the objects of the network device to detect the event based on the objects described in the database of management information;sending, by the network agent, an indication of the event to the network manager;logging, by the network agent, the events in the database of management information; andgenerating, by the network manager upon receiving the indication of the event, the audio message.
- The method of claim 10, wherein the broadcasting the audio message using the speaker further comprises broadcasting the audio message indicating at least one of:an abnormal status of the network device was detected,a parental control rule was triggered.an attempt by hackers to invade the network device, andthe service set identifier and password, wherein the broadcast of the audio message further comprises broadcasting the service set identifier and password to a mobile application.
- The method of claim 12, wherein the broadcasting the audio message comprises broadcasting an audio alarm message indicating the abnormal status of the network device was detected, wherein the broadcasting the audio alarm message indicating the abnormal status of the network further comprises broadcasting an audio alarm message indicating at least one of the network device failed to start based on a key system interface status, an IP connection was lost once a ping of a WAN side of the network device fails, and the temperature of the processor exceeds a predetermine high temperature level.
- The method of claim 12, wherein the broadcasting the audio message comprises broadcast of an audio alarm message indicating the parental control rule was triggered, wherein the broadcasting the audio alarm message indicating the parental control rule was triggered further comprises broadcasting at least one of an audio alarm message that an attempt to access a block website was detected, an audio alarm message that an attempt to access the Internet occurred at a blocked time, and an audio alarm message that a firewall logs indicate at least one rule were violated, and wherein the broadcasting the audio message comprises broadcasting an audio alarm message indicating an attempt by hackers to invade the network device, the broadcasting of the audio alarm message indicating an attempt by hackers to invade the network device further comprises broadcasting an audio alarm message indicating that attempts to connect to a private service set identifier using a plurality of different incorrect passwords or broadcasting an audio alarm message indicating a denial of service (DoS) attack detected by the firewall.
- The method of claim 10 further comprising:presenting a firewall setting by accessing a web page associated with the user interface and navigating from a main web page to hardware parameter selection page and then to a speaker parameter selection page; andproviding on the speaker parameter selection page:an interface for enabling or disabling the audio alarm; andan interface to select one of all, normal, or custom classes, wherein the custom class allows the user to select the alarm type to use.
- A non-transitory, computer-readable media having computer-readable instructions stored thereon, the computer-readable instructions being capable of being read by a network device, wherein the computer-readable instructions are capable of instructing the network device to perform a method for providing an audio alarm, the method comprising:configuring the network device via a user interface to generate an audio message associated with detection of an event;monitoring the network device, using a management tool, to detect the event;triggering, by the management tool, generation of the audio message in response to the detecting of the event;receiving the audio message at an audio device of the network device that includes a speaker; andbroadcasting the audio message using the speaker.
- The non-transitory, tangible, computer-readable media of claim 16, wherein the management tool comprises a network manager, a database of management information describing objects defining events of the network device, and a network agent, wherein the method further comprises:initiating, by the network manager, management commands;receiving, by the network manager, monitoring notifications from an object of the network device;describing, by objects stored in the database of management information, events of the network device;monitoring, by a network agent, the objects of the network device to detect the event based on the objects described in the database of management information;sending, by the network agent, an indication of the event to the network manager;logging, by the network agent, the events in the database of management information; andgenerating, by the network manager upon receiving the indication of the event, the audio message.
- The non-transitory, tangible, computer-readable media of claim 16, wherein the broadcasting the audio message using the speaker further comprising broadcasting an audio message indicating at least one of:an abnormal status of the network device was detected,a parental control rule was triggered.an attempt by hackers to invade the network device, andthe service set identifier and password, wherein the broadcast of the audio message further comprises broadcasting the service set identifier and password to a mobile application.
- The non-transitory, tangible, computer-readable media of claim 18, wherein the broadcasting the audio message comprises broadcasting an audio alarm message indicating the abnormal status of the network device was detected, wherein the broadcasting the audio alarm message indicating the abnormal status of the network further comprises broadcasting an audio alarm message indicating at least one of the network device failed to start based on a key system interface status, an IP connection was lost once a ping of a WAN side of the network device fails, and the temperature of the processor exceeds a predetermine high temperature level.
- The non-transitory, tangible, computer-readable media of claim 18, wherein the broadcasting the audio message comprises broadcast of an audio alarm message indicating the parental control rule was triggered, wherein the broadcasting the audio alarm message indicating the parental control rule was triggered further comprises broadcasting at least one of an audio alarm message that an attempt to access a block website was detected, an audio alarm message that an attempt to access the Internet occurred at a blocked time, and an audio alarm message that a firewall logs indicate at least one rule were violated, and wherein the broadcasting the audio message comprises broadcasting an audio alarm message indicating an attempt by hackers to invade the network device, the broadcasting of the audio alarm message indicating an attempt by hackers to invade the network device further comprises broadcasting an audio alarm message indicating that attempts to connect to a private service set identifier using a plurality of different incorrect passwords or broadcasting an audio alarm message indicating a denial of service (DoS) attack detected by the firewall.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| PCT/CN2020/103338 WO2022016391A1 (en) | 2020-07-21 | 2020-07-21 | Generating an audio message at a network device in response to detection of a network event |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| PCT/CN2020/103338 WO2022016391A1 (en) | 2020-07-21 | 2020-07-21 | Generating an audio message at a network device in response to detection of a network event |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2022016391A1 true WO2022016391A1 (en) | 2022-01-27 |
Family
ID=79728438
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/CN2020/103338 Ceased WO2022016391A1 (en) | 2020-07-21 | 2020-07-21 | Generating an audio message at a network device in response to detection of a network event |
Country Status (1)
| Country | Link |
|---|---|
| WO (1) | WO2022016391A1 (en) |
Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20030217110A1 (en) * | 2002-05-16 | 2003-11-20 | Weiss Eugene S. | Home gateway server appliance |
| US20050068567A1 (en) * | 2003-09-25 | 2005-03-31 | Hull Jonathan J. | Printer with audio or video receiver, recorder, and real-time content-based processing logic |
| US20120084857A1 (en) * | 2010-09-30 | 2012-04-05 | Verizon Patent And Licensing Inc. | Device security system |
| CN109447048A (en) * | 2018-12-25 | 2019-03-08 | 苏州闪驰数控系统集成有限公司 | A kind of artificial intelligence early warning system |
-
2020
- 2020-07-21 WO PCT/CN2020/103338 patent/WO2022016391A1/en not_active Ceased
Patent Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20030217110A1 (en) * | 2002-05-16 | 2003-11-20 | Weiss Eugene S. | Home gateway server appliance |
| US20050068567A1 (en) * | 2003-09-25 | 2005-03-31 | Hull Jonathan J. | Printer with audio or video receiver, recorder, and real-time content-based processing logic |
| US20120084857A1 (en) * | 2010-09-30 | 2012-04-05 | Verizon Patent And Licensing Inc. | Device security system |
| CN109447048A (en) * | 2018-12-25 | 2019-03-08 | 苏州闪驰数控系统集成有限公司 | A kind of artificial intelligence early warning system |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US7086089B2 (en) | Systems and methods for network security | |
| US20230020832A1 (en) | Network operation center dashboard for cloud-based Wi-Fi and cellular systems | |
| US7058796B2 (en) | Method and system for actively defending a wireless LAN against attacks | |
| US7355996B2 (en) | Systems and methods for adaptive monitoring with bandwidth constraints | |
| US7277404B2 (en) | System and method for sensing wireless LAN activity | |
| US7522908B2 (en) | Systems and methods for wireless network site survey | |
| US7324804B2 (en) | Systems and methods for dynamic sensor discovery and selection | |
| US7383577B2 (en) | Method and system for encrypted network management and intrusion detection | |
| US10057813B1 (en) | Onboarding and configuring Wi-Fi enabled devices | |
| US20210250771A1 (en) | Method For Determining Class Information And Apparatus | |
| US9210646B2 (en) | Back-up path for in-home diagnostics and other communications | |
| US11678187B2 (en) | Method for restricting access of terminal device and apparatus | |
| US20130007848A1 (en) | Monitoring of smart mobile devices in the wireless access networks | |
| US20230126313A1 (en) | Collecting client data for wireless client devices | |
| US20230254373A1 (en) | Device control method, server, and storage medium | |
| US11250172B2 (en) | Handling wireless client devices associated with a role indicating a stolen device | |
| WO2014094489A1 (en) | Preventing clients from accessing a rogue access point | |
| CN117356126A (en) | Devices, methods and computer programs | |
| WO2021163870A1 (en) | Onboarding of devices to different wireless networks | |
| US11689928B2 (en) | Detecting unauthorized access to a wireless network | |
| WO2022016391A1 (en) | Generating an audio message at a network device in response to detection of a network event | |
| US12184511B2 (en) | Network service processing method, system, and gateway device | |
| US20240196202A1 (en) | Systems and methods for uniquely identifying user equipment with a wireless network | |
| CN106488449A (en) | A kind of management method of Wireless Telecom Equipment and Wireless Telecom Equipment | |
| US20250373654A1 (en) | Systems and methods for detecting and remediating ddos attacks based on energy consumption |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 20946098 Country of ref document: EP Kind code of ref document: A1 |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 20946098 Country of ref document: EP Kind code of ref document: A1 |