×

Exchange of network access control information using tightly-constrained network access control protocols

  • US 8,104,073 B2
  • Filed: 09/18/2007
  • Issued: 01/24/2012
  • Est. Priority Date: 08/10/2007
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • receiving, with an access control device through a tightly-constrained handshake sequence of a network protocol, a first request to access a first network, wherein an endpoint device initiates the tightly-constrained handshake sequence when the endpoint device is requesting access rights for the first network;

    in response to the first request and after the tightly-constrained handshake sequence, negotiating a set of nonce information with the endpoint device and receiving a trusted platform module (“

    TPM”

    ) value from the endpoint device, wherein, due to constraints of the tightly-constrained handshake sequence, the access control device and the endpoint device are unable to negotiate the set of nonce information during the tightly-constrained handshake sequence;

    receiving, with the access control device, a second request to access the first network through a second tightly-constrained handshake sequence of the network protocol, wherein the second request includes a digital signature;

    in response to the second request, determining with the access control device whether the digital signature is valid according to the TPM value and the set of nonce information previously negotiated with the endpoint device in response to the first request; and

    granting the access rights to the endpoint device when the digital signature is valid.

View all claims
  • 12 Assignments
Timeline View
Assignment View
    ×
    ×