Authentication and authorization without the use of supplicants
First Claim
Patent Images
1. A system, comprising:
- a hardware processor that executes the following computer executable components stored in a memory;
an identification manager component that generates profile data for a device based on the device denying authorization to access a hostile source and in response to a first authentication request, andwherein the profile data includes at least data specific to a verifying user identity associated with the denial of the first authentication request; and
wherein a supplicant is not deployed on the device,an evaluation component that predicts an expected characteristic of a second authentication request by the device to access the hostile source prior to receipt of the second authentication request,wherein the evaluation component predicts a port connection for the second authentication request by combining the profile data with other profile data; and
a validation component that requests a second authentication of the device based on a detected state change between the device and the hostile source, andthat, in response to the receipt of the second authentication request compares the characteristic of the second authentication request to the predicted expected characteristic and, based on the comparison, controls access to a secure network,wherein the validation component automatically denies authentication of the device with the hostile source based on a determination that the characteristic of the second authentication request matches the expected characteristic,wherein the validation component requests additional information that comprises a reauthentication to a port from the device based on a determination that the characteristic of the second authentication request does match the expected characteristic.
1 Assignment
0 Petitions
Accused Products
Abstract
Provided is authentication and authorization without the use of supplicants. Authentication and authorization includes generating a profile for a device based on at least one characteristic observed during a successful attempt by the device to access an 802.1X network infrastructure. Expected characteristics for a next attempt to access the infrastructure by the device are determined. A characteristic of the next access attempt is matched to the expected characteristic and access to the network is selectively controlled as a result of the matching. This is achieved without a supplicant being installed on the device.
-
Citations
20 Claims
-
1. A system, comprising:
a hardware processor that executes the following computer executable components stored in a memory; an identification manager component that generates profile data for a device based on the device denying authorization to access a hostile source and in response to a first authentication request, and wherein the profile data includes at least data specific to a verifying user identity associated with the denial of the first authentication request; and wherein a supplicant is not deployed on the device, an evaluation component that predicts an expected characteristic of a second authentication request by the device to access the hostile source prior to receipt of the second authentication request, wherein the evaluation component predicts a port connection for the second authentication request by combining the profile data with other profile data; and a validation component that requests a second authentication of the device based on a detected state change between the device and the hostile source, and that, in response to the receipt of the second authentication request compares the characteristic of the second authentication request to the predicted expected characteristic and, based on the comparison, controls access to a secure network, wherein the validation component automatically denies authentication of the device with the hostile source based on a determination that the characteristic of the second authentication request matches the expected characteristic, wherein the validation component requests additional information that comprises a reauthentication to a port from the device based on a determination that the characteristic of the second authentication request does match the expected characteristic. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
9. A method, comprising:
-
generating, by a system comprising a processor, a profile for an endpoint based on a characteristic observed during a non-successful attempt by the endpoint to access a hostile source, wherein the non-successful attempt is in response to a first authentication request, and, wherein the profile includes at least data specific to a verifying user identity associated with a denial of the first authentication request, and wherein a supplicant is not deployed on the endpoint;
predicting, by the system, an expected characteristic for another attempt by the endpoint to access the hostile source, the other attempt is a future attempt,wherein the evaluation component predicts a port connection for the second authentication request by combining the profile data with other profile data; comparing, by the system, a characteristic of the other attempt by the endpoint to access the hostile source with the expected characteristic; and selectively controlling, by the system, access to the hostile source by the endpoint as a result of the comparing, wherein a validation component requests an authentication of a device based on a detected state change between the device and a secure network, wherein the request is the other authentication request, and wherein the selectively controlling access comprises automatically denying based on a determination that the characteristic of the other attempt matches the expected characteristic; wherein the validation component requests additional information that comprises a reauthentication to a port from the device based on a determination that the characteristic of the second authentication request does match the expected characteristic. - View Dependent Claims (10, 11, 12)
-
-
13. A computer-readable storage device storing executable instructions that, in response to execution, cause a system comprising a processor to perform operations, comprising:
-
generating profile data for a device based on the device being denied access to a hostile source in response to a first authentication request, and wherein the profile data includes at least data specific to a verifying user identity associated with the denial of the first authentication request; predicting an expected characteristic of a second authentication request by the device to access the hostile source, the predicted expected characteristic is a prediction of a characteristic of the second authentication request, wherein the predicting includes predicting a port connection for the second authentication request by combining the profile data with other profile data; and after receipt of the second authentication request, comparing the characteristic of the second authentication request to the expected characteristic; and controlling access to a secure network based on the comparison, wherein a supplicant is not deployed on the device, wherein controlling access includes; wherein the second authentication request is made based on a detected state change between the device and the secure network, request additional information from the device, wherein the additional information comprises a reauthentication to a port; upon a determination that the characteristic of the second authentication request matches the predicted expected characteristic, automatically denying the device with the hostile source. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20)
-
Specification