Authentication and authorization without the use of supplicants

作者: Lawrence T. Belton , Peter A. Makohon , Ryan B. Benskin , Timothy Morris , Christopher Houser

DOI:

关键词:

摘要: Provided is authentication and authorization without the use of supplicants. Authentication includes generating a profile for device based on at least one characteristic observed during successful attempt by to access an 802.1X network infrastructure. Expected characteristics next infrastructure are determined. A matched expected selectively controlled as result matching. This achieved supplicant being installed device.

参考文章(43)
Aji Joseph, Shashi Kumar, Sambasivam Valliappan, Peirong Feng, Atul Mahamuni, Navindra Yadav, Azim Ozakil, Bora A. Akyol, Thomas J. Enderwick, Integration of network admission control functions in network access devices ,(2011)
Shaun Kospiah, Timothy M. Lemm, Aaron R. Davis, Timothy M. Aldrich, Matthew S. Bialek, Software network behavior analysis and identification system ,(2013)
Madhusudan Raman, Jeffrey Getchius, Renu Chipalkatti, Predictive scoring management system for application behavior ,(2011)
Robert Holzmann, Lynne Sherburne-Benz, E Telsuic, Social risk management ,(2014)
Igal Figlin, Bryan C. Griffin, Vidyanand N. Rajpathak, Chengi Jimmy Kuo, Predictive malware threat mitigation ,(2010)
Nancy Cam-Winget, Hao Zhou, Bhawani Sapkota, System and method for wireless network profile provisioning ,(2007)
Ian Foo, Jason D. Frazier, Susan M. Sauter, Gregory Alan Moore, Cynthia D. Melter, Apparatus and methods for supporting 802.1X in daisy chained devices ,(2007)
Kyle Adams, Daniel J. Quinlan, Oskar Ibatullin, Identifying malicious devices within a computer network ,(2015)