×

Authentication and authorization without the use of supplicants

  • US 10,063,561 B1
  • Filed: 03/27/2018
  • Issued: 08/28/2018
  • Est. Priority Date: 03/16/2015
  • Status: Active Grant
First Claim
Patent Images

1. A system, comprising:

  • a hardware processor that executes the following computer executable components stored in a memory;

    an identification manager component that generates profile data for a device based on the device denying authorization to access a hostile source and in response to a first authentication request, andwherein the profile data includes at least data specific to a verifying user identity associated with the denial of the first authentication request;

    an evaluation component that determines an expected characteristic of a second authentication request by the device to access the hostile source prior to receipt of the second authentication request, the expected characteristic is a prediction of a characteristic of the second authentication request,wherein the evaluation component combines the profile data with other profile data to predict a port connection for the second authentication request; and

    a validation component that, in response to the receipt of the second authentication request compares the characteristic of the second authentication request to the expected characteristic and, based on the comparison, controls access to the secure network, wherein a supplicant is not deployed on the device,wherein the validation component requests an authentication of the device based on a detected state change between the device and the hostile source, wherein the request is the second authentication request,wherein the validation component automatically denies authentication of the device with the hostile source based on a determination that the characteristic of the second authentication request matches the expected characteristic, andwherein the validation component requests additional information that comprises a reauthentication to a port from the device based on a determination that the characteristic of the second authentication request does match the expected characteristic.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×