Method and Apparatus for Content Based Authentication for Network Access

a content authentication and network access technology, applied in the field of authentication techniques, to achieve the effect of restoring the integrity of the content of the devi

Inactive Publication Date: 2009-01-29
AVAYA INC
View PDF28 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If a device attempts to access a network, the content of the device is evaluated and the device may be restricted to accessing only one or more restoration services if the content fails to satisfy one or more predefined criteria.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and Apparatus for Content Based Authentication for Network Access
  • Method and Apparatus for Content Based Authentication for Network Access
  • Method and Apparatus for Content Based Authentication for Network Access

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018]FIG. 1 illustrates the network environment in which the present invention can operate. As shown in FIG. 1, a user employing a mobile computing device 110 attempts to access a network 120, such as an enterprise network, or a device or other resource connected to the network 120. According to one aspect of the invention, the user employing the mobile computing device 110 is challenged by an authentication server 400, discussed further below in conjunction with FIG. 4. The authentication server 400 may be associated, for example, with an enterprise or another network where network security is provided. While the present invention is illustrated in the context of an exemplary enterprise network 120, the present invention applies to many network environments where a network security policy is administered. Furthermore, while the user of a mobile device 110 will more likely take advantage of a wireless local area network than a wired network, the content authentication techniques of...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method and apparatus are provided for authenticating the contents of a device requesting access to a first network, such as an enterprise network. If a device has connected to at least one other network then the content of the device is evaluated prior to obtaining access. The scope of the content evaluation may be based, for example, on properties of the other network or on one or more defined content authentication rules. If a device attempts to access a network, the content of the device is evaluated and the device may be restricted to accessing only one or more restoration services if the content fails to satisfy one or more predefined criteria, such as a content item that is out of date or a determination that the device connected to one or more external networks. The restoration service(s) can update a content item that is out of date, reinstall one or more programs or return configuration settings to default values.

Description

CROSS-REFERENCE TO RELATED APPLICATIONS[0001]This application is a divisional of U.S. patent application Ser. No. 10 / 721,721, filed Nov. 25, 2003, incorporated by reference herein.FIELD OF THE INVENTION[0002]The present invention relates generally to authentication techniques and more particularly, to methods and apparatus for authenticating a user or device using a content based authentication procedure.BACKGROUND OF THE INVENTION[0003]A number of security issues arise when computers or other resources are connected over a network. As networks and networked devices become increasingly popular, the security of such networks and network devices becomes even more important. Network designers and system administrators must establish security policies that provide a balance between ease-of-use for users while also protecting the networks and network devices from undesirable events. Most networks and network devices incorporate computer security techniques, such as access control mechani...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(United States)
IPC IPC(8): G06F21/00H04L29/06
CPCH04L63/08H04W12/06H04L63/0876H04W12/062
Inventor KAPPES, MARTINKRISHNAN, P.
Owner AVAYA INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products