Dynamically mapping network trust relationships
First Claim
1. A method for enhancing capabilities of a communications device to enable generating trust relationships based on dynamically created maps of network trust relationships established among network devices, the method comprising:
- receiving, at a server computer, one or more authentication protocol messages from an authenticator computer device to authenticate a supplicant computer device;
transmitting, from the server computer, the one or more authentication protocol messages to an authentication computer server;
displaying on a digital computer display device a trust topology map as a graphical diagram and comprising information about trusted and untrusted links, encrypted and unencrypted links, authenticated and unauthenticated users, peer policies applied on the links, and roles associated with endpoints of the links;
after sending one or more corresponding response messages comprising one or more responses to the one or more authentication protocol messages, updating, based on the one or more responses, the trust topology map with information reflecting peer security policy data that indicates a secure link between the authenticator computer device and the supplicant computer device, and changes in one or more security trust relationships between the authenticator computer device and the supplicant computer device based on the authentication protocol messages and the response messages, and in which links and paths are coded according to encryption capabilities, security properties and other characteristics identified in the response and the peer security policy data.
0 Assignments
0 Petitions
Accused Products
Abstract
In an embodiment, the method is comprising, receiving an access request, from an authenticator device, to grant a supplicant device access to a data network; transmitting the access request to an authentication server; after sending a response that the access request was granted, updating a trust topology map by including in the trust topology map information that has been obtained from the response and that indicates a secure link between the authenticator device and the supplicant device, and causing displaying the updated trust topology map as a logical map depicting one or more network devices and roles assigned to the one or more network devices; wherein the method is performed by one or more computing device.
-
Citations
20 Claims
-
1. A method for enhancing capabilities of a communications device to enable generating trust relationships based on dynamically created maps of network trust relationships established among network devices, the method comprising:
-
receiving, at a server computer, one or more authentication protocol messages from an authenticator computer device to authenticate a supplicant computer device; transmitting, from the server computer, the one or more authentication protocol messages to an authentication computer server; displaying on a digital computer display device a trust topology map as a graphical diagram and comprising information about trusted and untrusted links, encrypted and unencrypted links, authenticated and unauthenticated users, peer policies applied on the links, and roles associated with endpoints of the links; after sending one or more corresponding response messages comprising one or more responses to the one or more authentication protocol messages, updating, based on the one or more responses, the trust topology map with information reflecting peer security policy data that indicates a secure link between the authenticator computer device and the supplicant computer device, and changes in one or more security trust relationships between the authenticator computer device and the supplicant computer device based on the authentication protocol messages and the response messages, and in which links and paths are coded according to encryption capabilities, security properties and other characteristics identified in the response and the peer security policy data. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. An internetworking computer device comprising:
-
one or more processors; an access unit coupled to the one or more processors and configured as a management computer device and configured to perform; receiving, at a server computer, one or more authentication protocol messages from an authenticator computer device to authenticate a supplicant computer device; transmitting, from the server computer, the one or more authentication protocol messages to an authentication computer server; displaying on a digital computer display device a trust topology map as a graphical diagram and comprising information about trusted and untrusted links, encrypted and unencrypted links, authenticated and unauthenticated users, policies applied on the links, and roles associated with endpoints of the links; after sending one or more corresponding response messages comprising one or more responses to the one or more authentication protocol messages, updating, based on the one or more responses, the trust topology map with information reflecting peer security policy data that indicates a secure link between the authenticator computer device and the supplicant computer device, and changes in one or more security trust relationships between the authenticator computer device and the supplicant computer device based on the authentication protocol messages and the response messages, and in which links and paths are coded according to encryption capabilities, security properties and other characteristics identified in the response and the peer security policy data. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer-readable storage medium storing one or more sequences of instructions which, when executed by one or more processors, cause the one or more processors of a management computer device to perform:
-
receiving, at a server computer, one or more authentication protocol messages from an authenticator computer device to authenticate a supplicant computer device; transmitting, from the server computer, the one or more authentication protocol messages to an authentication computer server; displaying on a digital computer display device a trust topology map as a graphical diagram and comprising information about trusted and untrusted links, encrypted and unencrypted links, authenticated and unauthenticated users, policies applied on the links, and roles associated with endpoints of the links; after sending one or more corresponding response messages comprising one or more responses to the one or more authentication protocol messages, updating, based on the one or more responses, the trust topology map with information reflecting peer security policy data that indicates a secure link between the authenticator computer device and the supplicant computer device, and changes in one or more security trust relationships between the authenticator computer device and the supplicant computer device based on the authentication protocol messages and the response messages, and in which links and paths are coded according to encryption capabilities, security properties and other characteristics identified in the response and the peer security policy data. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification