×

Network security based on device identifiers and network addresses

  • US 10,382,436 B2
  • Filed: 11/22/2016
  • Issued: 08/13/2019
  • Est. Priority Date: 11/22/2016
  • Status: Active Grant
First Claim
Patent Images

1. A computing system for controlling communication in a computer network managed by an organization, comprising:

  • a processor; and

    a memory that stores instructions that are configured, when executed by the processor, to evaluate a network communication from a first computing device, wherein the first computing device is connected to a first network and uses a source network address, by;

    determining whether the source network address is included in a list of trusted network addresses;

    when the source network address is not included in the list of trusted network addresses, disallowing the network communication on the first network;

    when the source network address is included in the list of trusted network addresses,receiving data representing a non-modifiable device identifier of the first computing device;

    determining whether the device identifier is included in a list of trusted device identifiers; and

    when the device identifier is included in the list of trusted device identifiers, allowing the network communication on the first network;

    receiving an indication of a white list of trusted network addresses that includes, for each of the trusted network addresses, one or more indications of allowable communication properties;

    determining a first communication property that is associated with the network communication;

    determining a second communication property that is an allowable communication property specified by an entry in the white list that corresponds to the source network address;

    evaluating the network communication with respect to the white list, by determining whether or not the first communication property is encompassed by the second communication property;

    in response to determining that the first communication property is not encompassed by the second communication property, disallowing the network communication;

    in response to determining that the first communication property is encompassed by the second communication property, allowing the network communication; and

    randomly auditing packets received at a network interface by;

    randomly selecting a first packet;

    determining whether the source network address and the non-modifiable device identifier associated with the first packet are both authorized;

    allowing multiple packets received from the first device subsequent to the first packet without verifying a non-modifiable device identifier;

    randomly selecting a second packet received after the multiple packets;

    determining whether the source network address and the non-modifiable device identifier are both authorized; and

    determining whether the source network address and the non-modifiable device identifier associated with the second packet are both authorized,wherein the first computing device is configured to execute a secure boot process that loads and executes only trusted code, wherein the trusted code disallows any modification of the source network address and non-modifiable device identifier.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×