17932975. SYSTEM AND METHOD FOR PROVIDING A VIRTUAL AUTHENTICATOR AND SUPPLICANT simplified abstract (Cisco Technology, Inc.)

From WikiPatents
Jump to navigation Jump to search

SYSTEM AND METHOD FOR PROVIDING A VIRTUAL AUTHENTICATOR AND SUPPLICANT

Organization Name

Cisco Technology, Inc.

Inventor(s)

Vivek Santuka of Morrisville NC (US)

Jatin Katyal of Murphy TX (US)

Prashant Chauhan of Shimla (IN)

SYSTEM AND METHOD FOR PROVIDING A VIRTUAL AUTHENTICATOR AND SUPPLICANT - A simplified explanation of the abstract

This abstract first appeared for US patent application 17932975 titled 'SYSTEM AND METHOD FOR PROVIDING A VIRTUAL AUTHENTICATOR AND SUPPLICANT

Simplified Explanation

The abstract describes a method for authenticating an endpoint device using a virtual authenticator. The method involves detecting a linkup event, requesting an identity from the endpoint device, receiving a response with the identity, obtaining an authorization result from an authentication server based on the identity, and enforcing the authorization result at the endpoint device.

  • Detect linkup event at virtual authenticator
  • Request identity from endpoint device
  • Receive response with identity from supplicant
  • Receive authorization result from authentication server
  • Enforce authorization result at endpoint device

Potential Applications

This technology could be applied in secure access control systems, network authentication protocols, and device management solutions.

Problems Solved

This technology solves the problem of unauthorized access to endpoint devices, enhances security measures in network environments, and streamlines the authentication process for users.

Benefits

The benefits of this technology include improved endpoint device security, simplified authentication procedures, and enhanced control over access permissions.

Potential Commercial Applications

A potential commercial application for this technology could be in the development of secure enterprise authentication solutions for businesses.

Possible Prior Art

One possible prior art for this technology could be existing network authentication protocols that authenticate devices based on identity verification.

What are the specific authentication methods used in this technology?

The specific authentication methods used in this technology include detecting linkup events, requesting identities, receiving responses, obtaining authorization results, and enforcing the results.

How does this technology improve endpoint device security compared to traditional authentication methods?

This technology improves endpoint device security by adding an additional layer of verification through the virtual authenticator, which enhances the overall authentication process and reduces the risk of unauthorized access.


Original Abstract Submitted

In one embodiment, a method includes detecting, at a virtual authenticator in an endpoint device, a linkup event, transmitting, to a supplicant in the endpoint device, a request for an identity associated with the endpoint device, receiving, at the virtual authenticator, a response from the supplicant, wherein the response comprises the identity, receiving, from an authentication server, an authorization result, wherein the authorization result is based on authenticating the endpoint device using the received identity, and enforcing, by the virtual authenticator, the authorization result at the endpoint device.