AUTHENTICATING A DEVICE BASED ON COMMUNICATION PATTERNS IN A GROUP OF DEVICES
First Claim
1. A method for authentication, comprising:
- storing accepted communication patterns representing accepted modes of communication between devices in an internet of things network; and
in response to receiving a new communication from a requesting device of the devices,determining whether the new communication matches at least one of the accepted communication patterns;
in response to determining that the new communication matches, responding to the new communication; and
in response to determining that the new communication does not match,flagging the new communication as an anomaly; and
determining how to process the new communication based on the flagging.
1 Assignment
0 Petitions
Accused Products
Abstract
Provided are techniques for authenticating a device. Accepted communication patterns representing accepted modes of communication between devices in an internet of things network are stored. In response to receiving a new communication from a requesting device of the devices, it is determined whether the new communication matches at least one of the accepted communication patterns. In response to determining that the new communication matches, there is a response to the new communication. In response to determining that the new communication does not match, flagging the new communication as an anomaly and determining how to process the new communication based on the flagging.
67 Citations
20 Claims
-
1. A method for authentication, comprising:
-
storing accepted communication patterns representing accepted modes of communication between devices in an internet of things network; and in response to receiving a new communication from a requesting device of the devices, determining whether the new communication matches at least one of the accepted communication patterns; in response to determining that the new communication matches, responding to the new communication; and in response to determining that the new communication does not match, flagging the new communication as an anomaly; and determining how to process the new communication based on the flagging. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computer program product, the computer program product comprising a computer readable storage medium having program code embodied therewith, the program code executable by at least one processor to perform:
-
storing accepted communication patterns representing accepted modes of communication between devices in an internet of things network; and in response to receiving a new communication from a requesting device of the devices, determining whether the new communication matches at least one of the accepted communication patterns; in response to determining that the new communication matches, responding to the new communication; and in response to determining that the new communication does not match, flagging the new communication as an anomaly; and determining how to process the new communication based on the flagging. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A computer system, comprising:
-
one or more processors, one or more computer-readable memories and one or more computer-readable, tangible storage devices; and program instructions, stored on at least one of the one or more computer-readable, tangible storage devices for execution by at least one of the one or more processors via at least one of the one or more memories, to perform operations comprising; storing accepted communication patterns representing accepted modes of communication between devices in an internet of things network; and in response to receiving a new communication from a requesting device of the devices, determining whether the new communication matches at least one of the accepted communication patterns; in response to determining that the new communication matches, responding to the new communication; and in response to determining that the new communication does not match, flagging the new communication as an anomaly; and determining how to process the new communication based on the flagging. - View Dependent Claims (17, 18, 19, 20)
-
Specification