17967416. ACCESS ENFORCEMENT THROUGH AUTHENTICATION VERIFICATION ENTITY (AVE) simplified abstract (Dell Products L.P.)

From WikiPatents
Revision as of 05:47, 26 April 2024 by Wikipatents (talk | contribs) (Creating a new page)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

ACCESS ENFORCEMENT THROUGH AUTHENTICATION VERIFICATION ENTITY (AVE)

Organization Name

Dell Products L.P.

Inventor(s)

Claudio Desanti of Santa Cruz CA (US)

David Black of Acton MA (US)

ACCESS ENFORCEMENT THROUGH AUTHENTICATION VERIFICATION ENTITY (AVE) - A simplified explanation of the abstract

This abstract first appeared for US patent application 17967416 titled 'ACCESS ENFORCEMENT THROUGH AUTHENTICATION VERIFICATION ENTITY (AVE)

Simplified Explanation

The patent application abstract describes new systems and methods for access control enforcement in a network fabric, which are stronger than soft zoning and do not require interaction with fabric switches like hard zoning. An Authentication Verification Entity (AVE) is used to cause authentication verification failures for unauthorized connections based on fabric configurations.

  • The innovation introduces a new method for access control enforcement in network fabrics.
  • The system utilizes an Authentication Verification Entity (AVE) to prevent unauthorized connections between hosts and subsystems.
  • The AVE triggers authentication verification failures for connections that do not comply with zoning configurations of the fabric.

Potential Applications

The technology can be applied in data centers, cloud computing environments, and network security systems.

Problems Solved

1. Enhanced access control enforcement in network fabrics. 2. Elimination of the need for fabric switches interaction for access control.

Benefits

1. Improved security in network fabrics. 2. Simplified access control management. 3. Enhanced compliance with zoning configurations.

Potential Commercial Applications

"Advanced Access Control Enforcement Technology for Network Fabrics" can be utilized in data centers, cloud service providers, and cybersecurity companies.

Possible Prior Art

There may be prior art related to access control enforcement in network fabrics using soft zoning and hard zoning methods.

Unanswered Questions

How does the new technology impact network performance?

The article does not provide information on the potential impact of the new access control enforcement technology on network performance.

What are the scalability considerations for implementing this technology in large networks?

The article does not address the scalability considerations for deploying the new access control enforcement technology in large network environments.


Original Abstract Submitted

Two main methods exist today to enforce access control in a network fabric: soft zoning and hard zoning. However, each of these approaches has some significant drawbacks. Accordingly, presented herein are new and improved systems and methods to perform access control enforcement, which is stronger than soft zoning, and does not need to interact with the fabric switches, as required by hard zoning. In one or more embodiments, an authentication verification entity (AVE) is provided with access control or authorization information. In one or more embodiments, the AVE uses this information to cause an authentication verification failure for connections between hosts and subsystems that are not allowed according to configurations (e.g., zoning configurations) of the fabric.