US 12,309,150 B1
Systems and methods configured for automatically assigning a unique identifier to a detected device
Vaibhav Anand, Chicago, IL (US); Charles Joseph Bonfield, Raleigh, NC (US); Brandon Lee Knight, South Lake Tahoe, CA (US); Sarthak Sahu, Pasadena, CA (US); Ciro Donalek, Pasadena, CA (US); and Michael Amori, Pasadena, CA (US)
Assigned to Virtualitics, Inc., Pasadena, CA (US)
Filed by Virtualitics, Inc., Pasadena, CA (US)
Filed on Jul. 26, 2024, as Appl. No. 18/785,915.
Claims priority of provisional application 63/649,179, filed on May 17, 2024.
Int. Cl. H04L 9/40 (2022.01)
CPC H04L 63/0876 (2013.01) 30 Claims
OG exemplary drawing
 
1. A computer-implemented method comprising:
obtaining, by a processor, a network map of a plurality of devices based on a scan of a network at a particular period of time data;
determining, by the processor, a digital fingerprint via a candidate identification data of at least one device of the plurality of devices within the network map by:
comparing the candidate identification data of the at least one device to other identification data associated with at least one previously identified device to verify the candidate identification data at the particular period of time to form verified identification data, and
generating a unique identification code that uniquely identifies the at least one device based on a similarity score and the verified identification data of the at least one device to form a digital fingerprint of the at least one device; and
generating, by the processor, a network security map that maps the at least one device based on the digital fingerprint of the at least one device so as to facilitate causing at least one security action with respect to the at least one device within the network, wherein the at least one security action is correlated to the similarity score of the at least one device within the network security map.