Method for managing network access
First Claim
1. A method of managing a network comprising:
- a) authenticating a first node for communication in said network, said first node having a first list of trusted Internet Protocol (IP) addresses;
b) adding an IP address of said first node to a second list of trusted IP addresses if said authentication in a) is successful, said second list stored at a second node in said network; and
c) transmitting said second list to said first node, if said authentication in a) is successful.
8 Assignments
0 Petitions
Accused Products
Abstract
A method for providing security in a computing network. A device connects to a network and authenticates itself with a server. Next, the server adds the IP address of the device to a list of trusted devices. The server broadcasts the trusted IP address to all devices in the network to which the newly authenticated device is allowed to communicate. The devices in the network add the trusted IP address to a list of trusted address stored on each device. The server may also transmit its stored list to the newly authenticated device. After a device has received a packet, it determines if the IP address associated with the packet is on its trusted list. If it is, the device processes the packet. If the IP address is not found on the safe list, the device queries the authentication server to determine if the IP address is safe.
122 Citations
20 Claims
-
1. A method of managing a network comprising:
-
a) authenticating a first node for communication in said network, said first node having a first list of trusted Internet Protocol (IP) addresses; b) adding an IP address of said first node to a second list of trusted IP addresses if said authentication in a) is successful, said second list stored at a second node in said network; and c) transmitting said second list to said first node, if said authentication in a) is successful. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method of managing a network comprising:
-
a) authenticating a first node for communication in said network; b) adding an address of said first node to a first list of trusted addresses stored at a second node in said network, if said authentication is successful; c) transmitting said address of said first node to authenticated nodes in said network, if said authentication in a) is successful; and d) adding said address of said first node to a third list of trusted addresses stored at a third node in response to said transmission in c). - View Dependent Claims (10, 11)
-
-
12. A method of managing a network comprising:
-
a) authenticating a first node to access said network; b) adding an address of said first node to a first list of authenticated addresses stored at a second node in said network, if said authentication is successful; c) transmitting a copy of said first list to said first node, if said authentication in a) is successful; and d) amending a second list of addresses with said first list of authenticated addresses, said second list stored on said first node. - View Dependent Claims (13, 14)
-
-
15. A computer readable medium having stored thereon instructions, which when run on a processor, perform a method of managing a network, said method comprising:
-
a) assigning a first node in said network an IP address, said assignment in response to receiving a standard Dynamic Host Configuration Protocol (DHCP) request for an address for said first node to use for communication in said network; b) assigning said first node to a subnet in said network based on its authentication to access said network, wherein said network comprises a plurality of subnets and the subnet to which said first node is assigned is a first subnet which provides limited access to said network and controls the portions of said network to which said first node has access c) receiving a request to authenticate said first node to have access to a second subnet; and d) assigning said first node to said second subnet if said authentication is successful, wherein said second subnet provides greater access to said network that said first subnet provides. - View Dependent Claims (16)
-
-
17. A method of managing a network, said method comprising:
-
a) receiving a request from a first node for an Internet Protocol (IP) address; b) assigning said first node to a first subnet in said network, wherein said first subnet is for nodes that have not been authenticated; c) receiving a request to authenticate said first node for access to a second subnet in said, wherein said second subnet is for nodes that have been authenticated; d) assigning said first node to said second subnet in said network if said authentication in c) is successful; and e) keeping said first node on said first subnet if said authentication in c) is unsuccessful.
-
-
18. A computer readable medium having stored thereon computer executable instructions, which when run on a processor, perform a method of managing a network, said method comprising:
-
a) authenticating a first node for communication on said network, said first node having a first list of trusted Internet Protocol (IP) addresses; and b) adding an IP address of said first node to a second list of trusted IP addresses stored at a second node in said network, if said authentication in a) is successful; and c) transmitting said second list to said first node, if said authentication in a) is successful. - View Dependent Claims (19, 20)
-
Specification