×

Authentication and authorization without the use of supplicants

  • US 9,954,869 B1
  • Filed: 09/08/2017
  • Issued: 04/24/2018
  • Est. Priority Date: 03/16/2015
  • Status: Active Grant
First Claim
Patent Images

1. A system, comprising:

  • a processor that executes the following computer executable components stored in a memory;

    an identification manager component that generates profile data for a device based on the device being authorized to access a secure network and in response to a first authentication request, andwherein the profile data includes at least data specific to a verifying user identity associated with an acceptance of the first authentication request;

    an evaluation component that determines an expected characteristic of a second authentication request by the device to access the secure network prior to receipt of the second authentication request, the expected characteristic is a prediction of a characteristic of the second authentication request,wherein the evaluation component combines the profile data with other profile data to predict a port connection for the second authentication request; and

    a validation component that, in response to the receipt of the second authentication request compares the characteristic of the second authentication request to the expected characteristic and, based on the comparison, controls access to the secure network, wherein a supplicant is not deployed on the device,wherein the validation component automatically authenticates the device with the secure network based on a determination that the characteristic of the second authentication request matches the expected characteristic, andwherein the validation component request an authentication of the device based on a detected state change between the device and the secure network, wherein the request is the second authentication request; and

    wherein the validation component automatically denies the device access to the secure network based on a determination that the characteristic of the second authentication request does not match the expected characteristic.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×