US 12,335,315 B2
Method and system for smart recommendation and dynamic grouping of devices for a better device management
Parminder Singh Sethi, Ludhiana (IN); and Lakshmi Saroja Nalam, Bangalore (IN)
Assigned to Dell Products L.P., Round Rock, TX (US)
Filed by Dell Products L.P., Round Rock, TX (US)
Filed on Jul. 10, 2023, as Appl. No. 18/349,279.
Prior Publication US 2025/0023918 A1, Jan. 16, 2025
Int. Cl. H04L 9/40 (2022.01); H04L 43/20 (2022.01)
CPC H04L 63/20 (2013.01) [H04L 63/1408 (2013.01); H04L 43/20 (2022.05)] 20 Claims
OG exemplary drawing
 
1. A method for managing edge devices, the method comprising:
monitoring, over a network, network traffic between an edge device (ED), an edge node (EN), and a cloud device (CD) to obtain a first dataset;
monitoring, over the network, an activity performed on the ED to obtain a second dataset;
analyzing the first dataset to generate a network traffic analysis output;
analyzing the second dataset to generate an activities analysis output;
performing a first tagging of the ED under as either a secured devices category or an unsecured devices category based on the network traffic analysis output, the activities analysis output, and a first identifier, wherein the first identifier is received from an administrator, making the ED is tagged under the unsecured devices category;
performing a second tagging, based on the first tagging and a second identifier, of the ED under a corresponding unsecured devices sub-category, wherein the second identifier is received from the administrator;
upon tagging the ED under the corresponding unsecured devices sub-category and based on the activities analysis output, making a determination that the activity is a malicious activity; and
implementing, based on the determination, a high-level security policy to disrupt a malicious user of the ED.